Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-4337: Vulnerability in Broadcom LSI Storage Authority (LSA)

0
Unknown
VulnerabilityCVE-2023-4337cvecve-2023-4337
Published: Tue Aug 15 2023 (08/15/2023, 18:25:36 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: LSI Storage Authority (LSA)

Description

Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation

AI-Powered Analysis

AILast updated: 11/04/2025, 16:56:34 UTC

Technical Analysis

CVE-2023-4337 identifies a security vulnerability in the Broadcom LSI Storage Authority (LSA) web interface, specifically related to improper session handling of managed servers during Gateway installation. The LSA software is used to manage Broadcom RAID controllers, which are integral to enterprise storage infrastructures. Improper session handling typically means that session tokens or credentials are not properly validated, expired, or isolated, which can allow an attacker to hijack an active session or replay session tokens to gain unauthorized access. This vulnerability could enable attackers to bypass authentication controls or escalate privileges within the RAID management interface, potentially allowing them to alter RAID configurations, access sensitive storage data, or disrupt storage availability. The vulnerability was published on August 15, 2023, but no CVSS score or known exploits have been reported yet. The lack of a CVSS score suggests that the vulnerability is still under evaluation, but session management flaws are generally considered serious due to their impact on confidentiality and integrity. The affected product, Broadcom LSI Storage Authority, is deployed in many enterprise environments, making this vulnerability relevant to organizations that rely on Broadcom RAID controllers for critical storage management. Since the vulnerability occurs during Gateway installation, it may also affect initial setup processes, potentially allowing attackers to compromise systems early in their deployment lifecycle. The absence of patches at the time of reporting means organizations must rely on compensating controls until vendor fixes are released.

Potential Impact

For European organizations, the impact of CVE-2023-4337 could be significant due to the widespread use of Broadcom RAID controllers in data centers, cloud providers, and critical infrastructure sectors such as finance, telecommunications, and government. Unauthorized access to RAID management interfaces can lead to data breaches, manipulation or deletion of stored data, and disruption of storage availability, which in turn can cause operational downtime and financial losses. The confidentiality of sensitive data stored on RAID arrays could be compromised if attackers gain control over the management interface. Integrity risks include unauthorized changes to RAID configurations that could degrade performance or cause data loss. Availability could be impacted if attackers intentionally disrupt RAID arrays or cause system instability. Given the critical role of storage systems in enterprise IT, exploitation of this vulnerability could have cascading effects on business continuity and regulatory compliance, especially under GDPR requirements for data protection. Organizations with complex storage environments or those using Broadcom LSA in multi-tenant or cloud settings face higher risks due to the potential for lateral movement and privilege escalation.

Mitigation Recommendations

Organizations should immediately review their Broadcom LSI Storage Authority deployment and restrict access to the management interface to trusted administrators only, ideally through network segmentation and VPNs. Monitoring and logging of session activity should be enhanced to detect anomalies indicative of session hijacking or replay attacks. Until vendor patches are available, consider disabling or limiting Gateway installation interfaces or applying strict access control lists (ACLs) to prevent unauthorized network access. Implement multi-factor authentication (MFA) where possible to reduce the risk of session compromise. Regularly update and audit session management configurations to ensure session tokens are properly invalidated after logout or timeout. Organizations should subscribe to Broadcom security advisories to promptly apply patches once released. Additionally, penetration testing and vulnerability scanning focused on session management can help identify exploitable weaknesses. Incident response plans should be updated to address potential exploitation scenarios involving storage management interfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
certcc
Date Reserved
2023-08-14T21:27:55.221Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a2de1f0ba78a050535c80

Added to database: 11/4/2025, 4:46:25 PM

Last enriched: 11/4/2025, 4:56:34 PM

Last updated: 11/6/2025, 1:25:45 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats