Refine your search

3 vulnerabilities found for FlashBlade by PureStorage

CVE-2026-0207 (GCVE-0-2026-0207)
Vulnerability from cvelistv5
Published
2026-04-14 17:53
Modified
2026-04-14 21:55
CWE
  • CWE-532 - Insertion of sensitive information into log file
Summary
A vulnerability exists in FlashBlade whereby sensitive information may be logged under specific conditions.
Impacted products
Vendor Product Version
PureStorage FlashBlade Version: 4.0.0   <
Version: 4.6.0   <
Version: 4.5.0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-0207",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-14T18:46:25.371315Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-14T18:48:09.639Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "FlashBlade",
          "vendor": "PureStorage",
          "versions": [
            {
              "lessThanOrEqual": "4.4.8",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.6.3",
              "status": "affected",
              "version": "4.6.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.5.13",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:purestorage:flashblade:*:*:*:*:*:*:*:*",
                  "versionEndIncluding": "4.4.8",
                  "versionStartIncluding": "4.0.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:purestorage:flashblade:*:*:*:*:*:*:*:*",
                  "versionEndIncluding": "4.6.3",
                  "versionStartIncluding": "4.6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:purestorage:flashblade:*:*:*:*:*:*:*:*",
                  "versionEndIncluding": "4.5.13",
                  "versionStartIncluding": "4.5.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability exists in FlashBlade whereby sensitive information may be logged under specific conditions."
            }
          ],
          "value": "A vulnerability exists in FlashBlade whereby sensitive information may be logged under specific conditions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-268",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-268 Audit Log Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-532",
              "description": "CWE-532 Insertion of sensitive information into log file",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-14T21:55:52.041Z",
        "orgId": "3895c224-4e1d-482a-adb3-fa64795683ac",
        "shortName": "PureStorage"
      },
      "references": [
        {
          "url": "https://support.purestorage.com/bundle/m_security_bulletins/page/Pure_Security/topics/concept/c_security_bulletins.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThis issue is resolved in the following FlashBlade Purity//FB releases:\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003ePurity//FB 4.5.14 or later\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003ePurity//FB 4.6.4 or later\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e"
            }
          ],
          "value": "This issue is resolved in the following FlashBlade Purity//FB releases:\n\n  *  Purity//FB 4.5.14 or later\n\n\n  *  Purity//FB 4.6.4 or later"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Sensitive Information Logging Vulnerability in FlashBlade",
      "x_generator": {
        "engine": "Vulnogram 1.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3895c224-4e1d-482a-adb3-fa64795683ac",
    "assignerShortName": "PureStorage",
    "cveId": "CVE-2026-0207",
    "datePublished": "2026-04-14T17:53:42.785Z",
    "dateReserved": "2025-10-30T16:15:36.793Z",
    "dateUpdated": "2026-04-14T21:55:52.041Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-0005 (GCVE-0-2024-0005)
Vulnerability from cvelistv5
Published
2024-09-23 17:34
Modified
2024-09-24 13:49
Severity ?
CWE
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
A condition exists in FlashArray and FlashBlade Purity whereby a malicious user could execute arbitrary commands remotely through a specifically crafted SNMP configuration.
References
Impacted products
Vendor Product Version
PureStorage FlashArray Version: 5.0.0   <
Version: 5.1.0   <
Version: 5.2.0   <
Version: 5.3.0   <
Version: 6.0.0   <
Version: 6.1.0   <
Version: 6.2.0   <
Version: 6.3.0   <
Version: 6.4.0   <
Version: 6.5.0
Version: 6.6.0
Create a notification for this product.
   PureStorage FlashBlade Version: 3.0.0   <
Version: 3.1.0   <
Version: 3.2.0   <
Version: 3.3.0   <
Version: 4.0.0   <
Version: 4.1.0   <
Version: 4.2.0   <
Version: 4.3.0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:purestorage:flasharray:5.0.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:purestorage:flasharray:5.1.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:purestorage:flasharray:5.2.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:purestorage:flasharray:5.3.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:purestorage:flasharray:6.0.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:purestorage:flasharray:6.1.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:purestorage:flasharray:6.2.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:purestorage:flasharray:6.3.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:purestorage:flasharray:6.4.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:purestorage:flasharray:6.5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flasharray",
            "vendor": "purestorage",
            "versions": [
              {
                "lessThanOrEqual": "5.0.11",
                "status": "affected",
                "version": "5.0.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "5.1.17",
                "status": "affected",
                "version": "5.1.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "5.2.7",
                "status": "affected",
                "version": "5.2.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "5.3.21",
                "status": "affected",
                "version": "5.3.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "6.0.9",
                "status": "affected",
                "version": "6.0.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "6.1.25",
                "status": "affected",
                "version": "6.1.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "6.2.17",
                "status": "affected",
                "version": "6.2.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "6.3.14",
                "status": "affected",
                "version": "6.3.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "6.4.10",
                "status": "affected",
                "version": "6.4.0",
                "versionType": "custom"
              },
              {
                "status": "affected",
                "version": "6.5.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:purestorage:flasharray:6.6.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flasharray",
            "vendor": "purestorage",
            "versions": [
              {
                "status": "affected",
                "version": "6.6.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:purestorage:flashblade:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flashblade",
            "vendor": "purestorage",
            "versions": [
              {
                "lessThanOrEqual": "3.0.9",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:purestorage:flashblade:3.1.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flashblade",
            "vendor": "purestorage",
            "versions": [
              {
                "lessThanOrEqual": "3.1.15",
                "status": "affected",
                "version": "3.1.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:purestorage:flashblade:3.2.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flashblade",
            "vendor": "purestorage",
            "versions": [
              {
                "lessThanOrEqual": "3.2.10",
                "status": "affected",
                "version": "3.2.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:purestorage:flashblade:3.3.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flashblade",
            "vendor": "purestorage",
            "versions": [
              {
                "lessThanOrEqual": "3.3.11",
                "status": "affected",
                "version": "3.3.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:purestorage:flashblade:4.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flashblade",
            "vendor": "purestorage",
            "versions": [
              {
                "lessThanOrEqual": "4.0.6",
                "status": "affected",
                "version": "4.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:purestorage:flashblade:4.1.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flashblade",
            "vendor": "purestorage",
            "versions": [
              {
                "lessThanOrEqual": "4.1.10",
                "status": "affected",
                "version": "4.1.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:purestorage:flashblade:4.2.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flashblade",
            "vendor": "purestorage",
            "versions": [
              {
                "lessThanOrEqual": "4.2.3",
                "status": "affected",
                "version": "4.2.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:purestorage:flashblade:4.3.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flashblade",
            "vendor": "purestorage",
            "versions": [
              {
                "lessThanOrEqual": "4.3.1",
                "status": "affected",
                "version": "4.3.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-0005",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-24T13:38:08.230078Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-24T13:49:20.771Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Purity"
          ],
          "product": "FlashArray",
          "vendor": "PureStorage",
          "versions": [
            {
              "lessThanOrEqual": "5.0.11",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "5.1.17",
              "status": "affected",
              "version": "5.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "5.2.7",
              "status": "affected",
              "version": "5.2.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "5.3.21",
              "status": "affected",
              "version": "5.3.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "6.0.9",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "6.1.25",
              "status": "affected",
              "version": "6.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "6.2.17",
              "status": "affected",
              "version": "6.2.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "6.3.14",
              "status": "affected",
              "version": "6.3.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "6.4.10",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "6.5.0"
            },
            {
              "status": "affected",
              "version": "6.6.0"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Purity"
          ],
          "product": "FlashBlade",
          "vendor": "PureStorage",
          "versions": [
            {
              "lessThanOrEqual": "3.0.9",
              "status": "affected",
              "version": "3.0.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "3.1.15",
              "status": "affected",
              "version": "3.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "3.2.10",
              "status": "affected",
              "version": "3.2.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "3.3.11",
              "status": "affected",
              "version": "3.3.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.0.6",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.1.10",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.2.3",
              "status": "affected",
              "version": "4.2.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.3.1",
              "status": "affected",
              "version": "4.3.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A condition exists in FlashArray and FlashBlade Purity whereby a malicious user could execute arbitrary commands remotely through a specifically crafted SNMP configuration."
            }
          ],
          "value": "A condition exists in FlashArray and FlashBlade Purity whereby a malicious user could execute arbitrary commands remotely through a specifically crafted SNMP configuration."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-23T17:34:11.321Z",
        "orgId": "3895c224-4e1d-482a-adb3-fa64795683ac",
        "shortName": "PureStorage"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://purestorage.com/security"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Affected customers will need to apply a self-service patch bundle or upgrade their Purity to an unaffected Purity version.\n\u003cbr\u003e\n\u003cbr\u003eThis issue is resolved in the following\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;FlashArray Purity \u003c/span\u003e releases:\n\u003cbr\u003e\u003cul\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePurity//FA versions 6.3.15 or later \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePurity//FA versions 6.5.1 or later \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePurity//FA versions 6.6.1 or later.\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis issue is resolved in the following\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;FlashBlade Purity \u003c/span\u003e releases:\n\u003cbr\u003e\u003cul\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePurity//FB versions 4.1.12 or later\n\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePurity//FB versions 4.3.2 or later\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e"
            }
          ],
          "value": "Affected customers will need to apply a self-service patch bundle or upgrade their Purity to an unaffected Purity version.\n\n\n\nThis issue is resolved in the following\u00a0FlashArray Purity  releases:\n\n  *  Purity//FA versions 6.3.15 or later \n  *  Purity//FA versions 6.5.1 or later \n  *  Purity//FA versions 6.6.1 or later.\n\n\nThis issue is resolved in the following\u00a0FlashBlade Purity  releases:\n\n  *  Purity//FB versions 4.1.12 or later\n\n  *  Purity//FB versions 4.3.2 or later"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3895c224-4e1d-482a-adb3-fa64795683ac",
    "assignerShortName": "PureStorage",
    "cveId": "CVE-2024-0005",
    "datePublished": "2024-09-23T17:34:11.321Z",
    "dateReserved": "2023-11-01T17:10:20.833Z",
    "dateUpdated": "2024-09-24T13:49:20.771Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-4976 (GCVE-0-2023-4976)
Vulnerability from cvelistv5
Published
2024-07-17 15:25
Modified
2025-04-10 14:18
CWE
  • CWE-269 - Improper Privilege Management
Summary
A flaw exists in FlashBlade whereby a local account is permitted to authenticate to the management interface using an unintended method that allows an attacker to gain privileged access to the array.
Impacted products
Vendor Product Version
PureStorage FlashBlade Version: 3.3.5   <
Version: 4.0.4   <
Version: 4.1.0   <
Version: 4.2.0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:purestorage:flashblade:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flashblade",
            "vendor": "purestorage",
            "versions": [
              {
                "lessThanOrEqual": "3.3.10",
                "status": "affected",
                "version": "3.3.5",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "4.0.6",
                "status": "affected",
                "version": "4.0.4",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "4.1.8",
                "status": "affected",
                "version": "4.1.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "4.2.2",
                "status": "affected",
                "version": "4.2.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-4976",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-17T17:54:56.371990Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-17T18:03:09.461Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:44:53.148Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://purestorage.com/security"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Purity//FB"
          ],
          "product": "FlashBlade",
          "vendor": "PureStorage",
          "versions": [
            {
              "lessThanOrEqual": "3.3.10",
              "status": "affected",
              "version": "3.3.5",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.0.6",
              "status": "affected",
              "version": "4.0.4",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.1.8",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.2.2",
              "status": "affected",
              "version": "4.2.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: transparent;\"\u003eA flaw exists in FlashBlade whereby a local account is permitted to authenticate to the management interface using an unintended method that allows an attacker to gain privileged access to the array.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "A flaw exists in FlashBlade whereby a local account is permitted to authenticate to the management interface using an unintended method that allows an attacker to gain privileged access to the array."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269 Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-10T14:18:03.534Z",
        "orgId": "3895c224-4e1d-482a-adb3-fa64795683ac",
        "shortName": "PureStorage"
      },
      "references": [
        {
          "url": "https://www.purestorage.com/security"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis vulnerability can be fixed either by applying a patch or upgrading to an unaffected Purity version. \u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis issue is resolved in the following FlashBlade Purity versions:\u003c/span\u003e\u003cbr\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePurity//FB 3.3.11 or later \u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePurity//FB 4.1.9 or later \u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePurity//FB 4.2.3 or later \u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePurity//FB 4.3.0 or later \u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePurity//FB 4.4.0 or later \u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e"
            }
          ],
          "value": "This vulnerability can be fixed either by applying a patch or upgrading to an unaffected Purity version. \n\nThis issue is resolved in the following FlashBlade Purity versions:\n\n\n  *  Purity//FB 3.3.11 or later \n\n\n\n\n  *  Purity//FB 4.1.9 or later \n\n\n\n\n  *  Purity//FB 4.2.3 or later \n\n\n\n\n  *  Purity//FB 4.3.0 or later \n\n\n\n\n  *  Purity//FB 4.4.0 or later"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "FlashBlade Authentication Mechanism Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3895c224-4e1d-482a-adb3-fa64795683ac",
    "assignerShortName": "PureStorage",
    "cveId": "CVE-2023-4976",
    "datePublished": "2024-07-17T15:25:58.472Z",
    "dateReserved": "2023-09-14T20:57:21.683Z",
    "dateUpdated": "2025-04-10T14:18:03.534Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}