Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute
CVE-2023-4329
9.8CRITICAL
Key Information:
- Vendor
- Broadcom
- Vendor
- CVE Published:
- 15 August 2023
Summary
The Broadcom RAID Controller web interface exhibits unsafe default settings in its HTTP configuration, exposing SESSIONID cookies to potential hijacking. The absence of the SameSite attribute enables cross-origin requests to access sensitive session data, thereby compromising user security. It is crucial for users to apply appropriate security measures to mitigate risks associated with this vulnerability.
Affected Version(s)
LSI Storage Authority (LSA) 0
RAID Web Console 3 (RWC3) 0 < 7.017.011.000
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Intel DCG