CVE-2024-3057

9.8 CRITICAL

📋 TL;DR

This vulnerability allows authenticated users to escalate privileges on Pure Storage FlashArray systems by making specific API calls. It affects administrators and users with access to FlashArray management interfaces, potentially enabling unauthorized administrative control.

💻 Affected Systems

Products:
  • Pure Storage FlashArray
Versions: Specific versions not detailed in reference; check Pure Storage advisory
Operating Systems: FlashArray OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to FlashArray management interface

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the FlashArray, allowing data destruction, configuration changes, or data exfiltration from all connected storage.

🟠

Likely Case

Malicious insider or compromised account escalates privileges to perform unauthorized administrative actions on storage systems.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the storage management network segment.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of specific API endpoint

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Pure Storage advisory for specific fixed versions

Vendor Advisory: https://support.purestorage.com/category/m_pure_storage_product_security

Restart Required: Yes

Instructions:

1. Review Pure Storage security advisory. 2. Identify affected FlashArray versions. 3. Schedule maintenance window. 4. Apply recommended Purity OS update. 5. Verify patch application and functionality.

🔧 Temporary Workarounds

Restrict API Access

all

Limit network access to FlashArray management interfaces to authorized administrators only

Implement Least Privilege

all

Review and minimize user privileges to reduce attack surface

🧯 If You Can't Patch

  • Isolate FlashArray management interfaces on dedicated VLAN with strict firewall rules
  • Implement multi-factor authentication and monitor for unusual privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check FlashArray Purity OS version against Pure Storage advisory

Check Version:

purearray list --version (or check via FlashArray web interface)

Verify Fix Applied:

Verify Purity OS version is updated to patched version listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual API calls to privilege escalation endpoints
  • Sudden privilege changes for user accounts
  • Administrative actions from non-admin accounts

Network Indicators:

  • Unusual API request patterns to FlashArray management IPs
  • Authentication attempts followed by privilege escalation attempts

SIEM Query:

source="flasharray" AND (event="api_call" AND endpoint="privilege_escalation_endpoint" OR user_privilege_change="true")

🔗 References

📤 Share & Export