Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-4326: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Broadcom LSI Storage Authority (LSA)

0
Unknown
VulnerabilityCVE-2023-4326cvecve-2023-4326cwe-327
Published: Tue Aug 15 2023 (08/15/2023, 18:25:38 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: LSI Storage Authority (LSA)

Description

Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites

AI-Powered Analysis

AILast updated: 11/04/2025, 16:53:50 UTC

Technical Analysis

CVE-2023-4326 is a cryptographic vulnerability in Broadcom's LSI Storage Authority (LSA), a management interface for Broadcom RAID controllers. The vulnerability arises from the use of an insecure default TLS configuration that supports SHA1-based cipher suites, which are considered obsolete and vulnerable to collision attacks. SHA1 has been deprecated in security standards due to its susceptibility to cryptographic weaknesses that can allow attackers to forge certificates or decrypt intercepted communications. The LSA web interface, which is used for RAID controller management, relies on TLS to secure administrative traffic. By supporting SHA1-based ciphers, the system potentially allows attackers with network access to perform man-in-the-middle (MITM) attacks, decrypt sensitive management data, or impersonate the server. Although no public exploits have been reported, the vulnerability represents a significant risk because it undermines the confidentiality and integrity of storage management communications. The affected product is Broadcom LSI Storage Authority, and the vulnerability is categorized under CWE-327, indicating the use of broken or risky cryptographic algorithms. No CVSS score has been assigned yet, and no patches or mitigations are directly linked in the provided data, suggesting that organizations must proactively assess and update their TLS configurations. This vulnerability is particularly relevant for environments where Broadcom RAID controllers are deployed, especially in enterprise and data center settings where secure storage management is critical.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive storage management data, including configuration details and administrative credentials, if an attacker successfully exploits the weak TLS configuration. This compromises confidentiality and integrity, potentially allowing attackers to manipulate RAID configurations or disrupt storage availability indirectly. Given the critical role of RAID controllers in data storage infrastructure, exploitation could lead to data loss or downtime if attackers gain control or disrupt management operations. The risk is heightened in environments where network segmentation is weak or where management interfaces are exposed to less trusted networks. European data centers, cloud providers, and enterprises relying on Broadcom RAID solutions could face operational disruptions and compliance issues, especially under regulations like GDPR that mandate strong data protection measures. The absence of known exploits suggests the threat is currently theoretical but should be addressed promptly to prevent future attacks.

Mitigation Recommendations

Organizations should immediately audit their Broadcom LSI Storage Authority deployments to identify TLS configurations supporting SHA1-based cipher suites. Administrators must disable all SHA1-based ciphers and enforce the use of modern, secure TLS versions (TLS 1.2 or higher) with strong cipher suites such as those using SHA256 or SHA3. If firmware or software updates are available from Broadcom, they should be applied promptly to address this vulnerability. Network segmentation should be enhanced to restrict access to the RAID controller management interface to trusted administrative networks only. Additionally, organizations should implement monitoring for unusual access patterns or TLS downgrade attempts on these interfaces. Where possible, use VPNs or other secure tunnels to access management interfaces rather than exposing them directly. Finally, organizations should engage with Broadcom support for official patches or guidance and incorporate this vulnerability into their risk management and incident response plans.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
certcc
Date Reserved
2023-08-14T21:19:37.314Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a2de0f0ba78a050535bbb

Added to database: 11/4/2025, 4:46:24 PM

Last enriched: 11/4/2025, 4:53:50 PM

Last updated: 11/6/2025, 12:02:16 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats