Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-4336: Vulnerability in Broadcom LSI Storage Authority (LSA)

0
Unknown
VulnerabilityCVE-2023-4336cvecve-2023-4336
Published: Tue Aug 15 2023 (08/15/2023, 18:25:36 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: LSI Storage Authority (LSA)

Description

Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute

AI-Powered Analysis

AILast updated: 11/04/2025, 16:56:23 UTC

Technical Analysis

CVE-2023-4336 identifies a security vulnerability in the Broadcom LSI Storage Authority (LSA) RAID Controller's web interface, specifically related to its default HTTP configuration. The vulnerability arises because the web interface does not set the Secure attribute on cookies by default. The Secure attribute is critical for cookies as it instructs browsers to only send cookies over HTTPS connections, thereby protecting session cookies from being transmitted over unencrypted HTTP. Without this attribute, session cookies can be exposed to interception via man-in-the-middle (MITM) attacks on unencrypted networks. This exposure can lead to session hijacking, allowing attackers to impersonate legitimate users, potentially gaining unauthorized access to the RAID controller's management functions. The vulnerability affects all versions of LSI Storage Authority as no specific version restrictions are noted. No CVSS score has been assigned yet, and no known exploits have been reported in the wild, indicating this is a newly disclosed issue. The lack of the Secure attribute does not directly allow code execution or privilege escalation but compromises the confidentiality and integrity of session management. The vulnerability is particularly relevant for environments where the RAID controller's web interface is accessible over HTTP or untrusted networks. Since RAID controllers are critical infrastructure components managing storage arrays, unauthorized access could lead to data exposure or disruption of storage services. The absence of patches or official mitigation guidance suggests that organizations must implement compensating controls such as enforcing HTTPS and reviewing network access policies to protect the management interface.

Potential Impact

For European organizations, the impact of CVE-2023-4336 centers on the potential compromise of RAID controller management sessions. If an attacker can intercept network traffic—especially in environments where the management interface is accessible over unencrypted HTTP—they could hijack administrative sessions. This could lead to unauthorized configuration changes, disruption of storage services, or exposure of sensitive data stored on RAID arrays. Organizations with remote or web-accessible management interfaces are at higher risk, including data centers, cloud providers, and enterprises with distributed infrastructure. The vulnerability undermines confidentiality and integrity but does not directly affect availability unless attackers deliberately disrupt storage configurations. Given the critical role of storage controllers in enterprise IT, any compromise could have cascading effects on business operations and data security. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often target misconfigured management interfaces. European organizations must consider the risk in the context of GDPR and other data protection regulations, as unauthorized access to storage systems could lead to data breaches with regulatory consequences.

Mitigation Recommendations

To mitigate CVE-2023-4336, organizations should: 1) Immediately enforce HTTPS-only access to the Broadcom LSI Storage Authority web interface by configuring SSL/TLS certificates and disabling HTTP access to prevent cookie exposure over unencrypted channels. 2) Verify and configure the web server or application to set the Secure attribute on all session cookies to ensure they are only transmitted over secure connections. 3) Restrict network access to the RAID controller management interface using firewalls or network segmentation, limiting access to trusted administrative networks or VPNs. 4) Monitor network traffic and logs for unusual session activity or repeated login attempts that may indicate session hijacking attempts. 5) Stay alert for official patches or updates from Broadcom and apply them promptly once available. 6) Educate administrators about the risks of accessing management interfaces over insecure networks and encourage the use of secure remote access methods. 7) Conduct regular security assessments of management interfaces to detect misconfigurations or vulnerabilities. These steps go beyond generic advice by focusing on specific configuration changes and network controls tailored to the affected product and vulnerability nature.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
certcc
Date Reserved
2023-08-14T21:27:55.157Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a2de1f0ba78a050535c7c

Added to database: 11/4/2025, 4:46:25 PM

Last enriched: 11/4/2025, 4:56:23 PM

Last updated: 11/6/2025, 11:48:25 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats