CVE-2023-45084

7.0 HIGH

📋 TL;DR

A synchronization flaw in SoftIron HyperCloud density storage nodes causes the system to incorrectly identify reinserted drive caddies as new media, triggering automatic data wiping. This vulnerability leads to permanent data loss and impacts data availability and integrity. Only affects SoftIron HyperCloud density storage nodes running HyperCloud software versions 1.0 through 2.0.2.

💻 Affected Systems

Products:
  • SoftIron HyperCloud density storage nodes
Versions: 1.0 to before 2.0.3
Operating Systems: HyperCloud software platform
Default Config Vulnerable: ⚠️ Yes
Notes: Only impacts 'density' storage node models; other HyperCloud node types are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete data loss on all drives in affected storage nodes, requiring restoration from backups and causing extended service downtime.

🟠

Likely Case

Accidental or malicious drive caddy removal/reinsertion causes data wiping on specific drives, leading to partial data loss and service disruption.

🟢

If Mitigated

With proper physical access controls and monitoring, risk is limited to accidental insider actions rather than malicious external attacks.

🌐 Internet-Facing: LOW - Requires physical access to storage hardware, not remotely exploitable over network.
🏢 Internal Only: HIGH - Physical access to data center or server room enables exploitation by insiders or attackers who bypass physical security.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple physical action of removing and reinserting drive caddy

Exploitation requires physical access to hardware; no authentication or special privileges needed once physical access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.3

Vendor Advisory: https://advisories.softiron.cloud

Restart Required: Yes

Instructions:

1. Backup all data before proceeding. 2. Download HyperCloud version 2.0.3 from SoftIron support portal. 3. Follow SoftIron's documented upgrade procedure for HyperCloud software. 4. Reboot all affected density storage nodes after upgrade.

🔧 Temporary Workarounds

Physical access restriction

all

Implement strict physical security controls to prevent unauthorized access to storage hardware

Drive caddy locking

all

Use physical locks or tamper-evident seals on drive caddies to prevent removal

🧯 If You Can't Patch

  • Implement enhanced physical security: biometric access, surveillance cameras, and access logs for server rooms
  • Establish strict procedures: require two-person verification for any drive maintenance, maintain detailed change logs

🔍 How to Verify

Check if Vulnerable:

Check HyperCloud software version via management interface or CLI; versions 1.0 through 2.0.2 on density nodes are vulnerable

Check Version:

hypercloud --version or check via HyperCloud management dashboard

Verify Fix Applied:

Confirm HyperCloud software version shows 2.0.3 or later on all density storage nodes

📡 Detection & Monitoring

Log Indicators:

  • Drive caddy removal events in system logs
  • Unexpected drive initialization/formatting events
  • Storage pool degradation alerts

Network Indicators:

  • Sudden storage capacity changes reported by monitoring systems

SIEM Query:

source="hypercloud" AND (event="drive_removed" OR event="drive_initialized")

🔗 References

📤 Share & Export