CVE-2024-55582

5.7 MEDIUM

📋 TL;DR

CVE-2024-55582 is a vulnerability in Oxide versions before 6 where Control Plane datastores are stored unencrypted. This allows attackers with access to the storage system to read sensitive configuration and operational data. All Oxide deployments using versions before 6 are affected.

💻 Affected Systems

Products:
  • Oxide Control Plane
Versions: All versions before 6.0
Operating Systems: All supported Oxide platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of Oxide before version 6 are vulnerable. The vulnerability affects the Control Plane datastore encryption configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive operational data including credentials, configuration secrets, and system state information leading to full system compromise.

🟠

Likely Case

Unauthorized access to sensitive configuration data that could enable further attacks or expose operational secrets.

🟢

If Mitigated

Limited exposure of non-critical configuration data if proper access controls and network segmentation are in place.

🌐 Internet-Facing: MEDIUM - While the vulnerability itself doesn't directly expose services to the internet, internet-facing Oxide deployments could have their storage systems compromised through other vectors.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can easily access unencrypted datastores if they gain storage access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires access to the storage system where datastores are located.

Exploitation requires access to the underlying storage system. No authentication bypass is needed once storage access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0 and later

Vendor Advisory: https://docs.oxide.computer/security/advisories/20240118-1

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Upgrade Oxide to version 6.0 or later. 3. Verify datastore encryption is enabled. 4. Restart Oxide services.

🔧 Temporary Workarounds

Enable storage-level encryption

all

Configure encryption at the storage layer (filesystem or block storage) to protect datastores.

# For ZFS: zfs set encryption=on oxide/datastore
# For LUKS: cryptsetup luksFormat /dev/sdX
# For cloud storage: Enable encryption at rest

Restrict storage access

linux

Implement strict access controls on the storage system containing Oxide datastores.

# Set restrictive permissions: chmod 600 /path/to/datastores
# Use filesystem ACLs: setfacl -m u:oxide:rwx /path/to/datastores

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Oxide storage systems
  • Enable full-disk encryption on all storage devices containing Oxide datastores

🔍 How to Verify

Check if Vulnerable:

Check Oxide version with 'oxide version' command and verify if below 6.0. Check datastore encryption status in configuration.

Check Version:

oxide version

Verify Fix Applied:

Verify version is 6.0 or higher with 'oxide version'. Check that datastore encryption is enabled in configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to storage systems
  • Configuration changes to datastore settings

Network Indicators:

  • Unusual access patterns to storage systems from unauthorized sources

SIEM Query:

source="oxide" AND (event_type="config_change" OR event_type="storage_access")

🔗 References

📤 Share & Export