Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-4331: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Broadcom LSI Storage Authority (LSA)

0
Unknown
VulnerabilityCVE-2023-4331cvecve-2023-4331cwe-327
Published: Tue Aug 15 2023 (08/15/2023, 18:25:37 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: LSI Storage Authority (LSA)

Description

Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols

AI-Powered Analysis

AILast updated: 11/04/2025, 16:55:07 UTC

Technical Analysis

CVE-2023-4331 identifies a cryptographic vulnerability in Broadcom's LSI Storage Authority (LSA), specifically in the RAID Controller web interface. The root cause is an insecure default TLS configuration that supports obsolete and vulnerable TLS protocols, which fall under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm). These outdated protocols may include TLS 1.0 or TLS 1.1, or weak cipher suites that have known cryptographic weaknesses. Such configurations undermine the confidentiality and integrity of data exchanged between administrators and the RAID controller management interface. An attacker with network access to the management interface could exploit this vulnerability to perform man-in-the-middle (MitM) attacks, decrypt sensitive management traffic, or inject malicious commands. Although no public exploits have been reported, the vulnerability is significant because storage controllers often manage critical data infrastructure. The lack of a CVSS score indicates this is a newly published vulnerability (August 2023) with limited public analysis. The vulnerability affects all versions of LSI Storage Authority as indicated, suggesting a broad exposure. The absence of patches at the time of publication means organizations must rely on configuration changes or network controls to mitigate risk. The vulnerability’s impact is primarily on confidentiality and integrity, with availability less directly affected unless an attacker uses the access to disrupt management operations.

Potential Impact

For European organizations, the impact of CVE-2023-4331 can be substantial, especially for those in data-intensive sectors such as finance, telecommunications, healthcare, and government. Compromise of the RAID controller management interface could lead to unauthorized access to storage system configurations, exposure of sensitive data, or manipulation of storage operations. This could result in data breaches, loss of data integrity, or disruption of critical storage services. Given the central role of storage controllers in enterprise IT infrastructure, exploitation could cascade into broader operational impacts. The vulnerability also raises compliance concerns under regulations like GDPR, as unauthorized data exposure could lead to regulatory penalties. Organizations relying on Broadcom LSA without updated TLS configurations are particularly vulnerable to interception and MitM attacks, especially if the management interfaces are accessible over less secure or public networks. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits targeting this weakness.

Mitigation Recommendations

To mitigate CVE-2023-4331, organizations should immediately review and harden the TLS configuration on Broadcom LSI Storage Authority web interfaces. This includes disabling all obsolete TLS versions such as TLS 1.0 and TLS 1.1 and enforcing TLS 1.2 or higher with strong cipher suites (e.g., AES-GCM, ChaCha20-Poly1305). Network segmentation should be applied to restrict access to the RAID controller management interface to trusted administrative networks only. Use of VPNs or secure jump hosts for remote management can further reduce exposure. Monitoring and logging of access to the management interface should be enhanced to detect suspicious activity. Organizations should also engage with Broadcom support to obtain patches or updated firmware addressing this vulnerability as they become available. Regular vulnerability scanning and penetration testing should include checks for weak TLS configurations. Finally, educating IT staff about the risks of legacy cryptographic protocols and enforcing strict cryptographic policies will help prevent similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
certcc
Date Reserved
2023-08-14T21:25:58.466Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a2de0f0ba78a050535bcb

Added to database: 11/4/2025, 4:46:24 PM

Last enriched: 11/4/2025, 4:55:07 PM

Last updated: 11/6/2025, 1:30:05 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats