Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-4328: CWE-522 Insufficiently Protected Credentials in Broadcom LSI Storage Authority (LSA)

0
Unknown
VulnerabilityCVE-2023-4328cvecve-2023-4328cwe-522
Published: Tue Aug 15 2023 (08/15/2023, 18:25:38 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: LSI Storage Authority (LSA)

Description

Broadcom RAID Controller web interface is vulnerable to exposure of sensitive data and the keys used for encryption are accessible to any local user on Windows

AI-Powered Analysis

AILast updated: 11/04/2025, 16:54:37 UTC

Technical Analysis

CVE-2023-4328 identifies a security vulnerability in Broadcom's LSI Storage Authority (LSA) RAID Controller web interface on Windows platforms. The core issue is classified under CWE-522, which relates to insufficient protection of credentials. Specifically, the encryption keys used by the RAID controller's web interface are stored in a manner accessible to any local user on the Windows system. This means that any user with local access privileges can retrieve sensitive encryption keys and credentials without needing elevated permissions or authentication. The vulnerability arises from improper credential storage and access control mechanisms within the LSA software. While no public exploits have been reported, the exposure of encryption keys can allow attackers to decrypt stored data, manipulate RAID configurations, or escalate privileges by leveraging the compromised credentials. The affected product, Broadcom's LSI Storage Authority, is widely used in enterprise environments to manage RAID controllers, making this vulnerability relevant to organizations relying on Broadcom hardware for data storage solutions. The lack of a CVSS score indicates that the vulnerability has not yet been fully assessed for severity, but the technical details suggest a significant risk due to the sensitivity of the exposed information and the ease of local exploitation. The vulnerability is limited to Windows systems running the affected LSA software, and exploitation requires local access, which may limit remote attack vectors but still poses a serious insider threat or risk from compromised local accounts.

Potential Impact

For European organizations, the exposure of encryption keys and credentials in Broadcom's LSI Storage Authority can lead to severe confidentiality breaches, allowing unauthorized users to access or decrypt sensitive stored data. Integrity of RAID configurations may also be compromised, potentially leading to data corruption or loss. Availability could be indirectly affected if attackers manipulate RAID settings or cause system instability. Enterprises relying on Broadcom RAID controllers for critical storage infrastructure, such as financial institutions, healthcare providers, and government agencies, face heightened risks. The vulnerability could facilitate insider threats or lateral movement within networks if local user accounts are compromised. Given the widespread use of Broadcom storage solutions in Europe, especially in countries with advanced IT infrastructure, the potential impact includes data breaches, regulatory non-compliance (e.g., GDPR violations), and operational disruptions. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop tools to leverage this vulnerability.

Mitigation Recommendations

Organizations should immediately audit and restrict local user access on Windows systems running Broadcom LSI Storage Authority to minimize exposure. Implement strict access controls and least privilege principles to ensure only trusted administrators have local access. Monitor systems for unusual local access patterns or attempts to retrieve sensitive files related to LSA. Since no official patches are currently available, maintain close communication with Broadcom for updates and apply security patches promptly once released. Consider isolating management interfaces and using network segmentation to limit access to systems running LSA. Employ endpoint detection and response (EDR) solutions to detect potential exploitation attempts. Additionally, encrypt sensitive configuration files and credentials at rest using OS-level protections or third-party tools to add an extra layer of security. Regularly review and update security policies concerning local user privileges and credential management. Finally, conduct security awareness training to reduce insider threat risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
certcc
Date Reserved
2023-08-14T21:25:58.130Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a2de0f0ba78a050535bc3

Added to database: 11/4/2025, 4:46:24 PM

Last enriched: 11/4/2025, 4:54:37 PM

Last updated: 11/6/2025, 2:07:18 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats