A flaw exists in FlashBlade Purity whereby an authenticated user with access to FlashBlade’s object store protocol can impact the availability of the system’s data access and replication protocols.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.purestorage.com/Employee_Handbooks/Technical_Services/PSIRT/Security_Bulletin_for_FlashBlade_Object_Store_Protocol_CVE-2023-31042 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.7 |
05 Oct 2023, 15:46
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Purestorage purity
Purestorage |
|
CPE | cpe:2.3:a:purestorage:purity:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
References | (MISC) https://support.purestorage.com/Employee_Handbooks/Technical_Services/PSIRT/Security_Bulletin_for_FlashBlade_Object_Store_Protocol_CVE-2023-31042 - Vendor Advisory |
02 Oct 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-02 23:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31042
Mitre link : CVE-2023-31042
CVE.ORG link : CVE-2023-31042
JSON object : View
Products Affected
purestorage
- purity
CWE