CVE-2024-22216

10.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthorized access to Microchip maxView Storage Manager's Redfish server, enabling attackers to modify data and disclose sensitive information. It affects all default installations with Redfish configured for remote management, specifically versions 3.00.23484 through 4.14.00.26064 (except patched versions 3.07.23980 and 4.07.00.25339).

💻 Affected Systems

Products:
  • Microchip maxView Storage Manager for Adaptec Smart Storage Controllers
Versions: 3.00.23484 through 4.14.00.26064 (excluding 3.07.23980 and 4.07.00.25339)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where Redfish server is configured for remote system management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing data destruction, configuration tampering, and full information disclosure of storage systems.

🟠

Likely Case

Unauthorized data access and modification of storage configurations leading to data integrity issues.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized Redfish access.

🌐 Internet-Facing: HIGH - Redfish servers exposed to internet are trivially exploitable with CVSS 10.0 rating.
🏢 Internal Only: HIGH - Even internal attackers can exploit this vulnerability if they reach the Redfish interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-284 indicates improper access control, suggesting straightforward exploitation once Redfish interface is reached.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.07.23980 or 4.07.00.25339

Vendor Advisory: https://www.microchip.com/en-us/solutions/embedded-security/how-to-report-potential-product-security-vulnerabilities/maxview-storage-manager-redfish-server-vulnerability

Restart Required: Yes

Instructions:

1. Download patched version from Microchip support portal. 2. Backup current configuration. 3. Install update following vendor instructions. 4. Restart system and verify Redfish service is running.

🔧 Temporary Workarounds

Disable Redfish Remote Management

all

Disable Redfish server or restrict to localhost only if remote management not required.

Configure maxView Storage Manager settings to disable Redfish remote access

Network Segmentation

linux

Restrict network access to Redfish port (typically 443/HTTPS) using firewall rules.

iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to isolate Redfish interface from untrusted networks
  • Enable detailed logging and monitoring for unauthorized access attempts to Redfish endpoints

🔍 How to Verify

Check if Vulnerable:

Check maxView Storage Manager version and verify if Redfish server is enabled for remote management.

Check Version:

Check version in maxView Storage Manager GUI or via 'maxview --version' command line

Verify Fix Applied:

Confirm version is 3.07.23980 or higher for v3, or 4.07.00.25339 or higher for v4.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized authentication attempts to Redfish endpoints
  • Unexpected configuration changes to storage systems

Network Indicators:

  • Unusual traffic to Redfish port (443) from unexpected sources
  • Redfish API calls from unauthorized IP addresses

SIEM Query:

source="maxview" AND (event="authentication_failure" OR event="configuration_change")

🔗 References

📤 Share & Export