Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-4345: Vulnerability in Broadcom LSI Storage Authority (LSA)

0
Unknown
VulnerabilityCVE-2023-4345cvecve-2023-4345
Published: Tue Aug 15 2023 (08/15/2023, 17:46:38 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: LSI Storage Authority (LSA)

Description

Broadcom RAID Controller web interface is vulnerable client-side control bypass leads to unauthorized data access for low privileged user

AI-Powered Analysis

AILast updated: 11/04/2025, 16:58:44 UTC

Technical Analysis

CVE-2023-4345 identifies a security vulnerability in the Broadcom LSI Storage Authority (LSA), specifically within the web interface used to manage Broadcom RAID controllers. The vulnerability arises from a client-side control bypass, which allows a user with low privileges to circumvent intended restrictions and gain unauthorized access to data managed by the RAID controller. This implies that the web interface does not adequately enforce access controls on the client side, potentially allowing manipulation of client-side logic or parameters to escalate privileges or access sensitive information. The affected product, Broadcom LSI Storage Authority, is commonly used in enterprise storage environments to manage RAID arrays, making this vulnerability particularly concerning for organizations relying on these systems for critical data storage. Although no public exploits have been reported, the nature of the vulnerability suggests that an attacker with legitimate low-level access could exploit it without requiring advanced techniques or external authentication bypasses. The lack of a CVSS score indicates that the vulnerability has not yet been fully assessed for severity, but the potential for unauthorized data access in a storage management context is significant. The vulnerability was published on August 15, 2023, and no patches or mitigations have been explicitly linked yet, emphasizing the need for proactive security measures by affected organizations.

Potential Impact

For European organizations, the impact of CVE-2023-4345 could be substantial, particularly for those operating data centers, cloud services, or enterprise storage infrastructures that utilize Broadcom RAID controllers managed via LSI Storage Authority. Unauthorized data access could lead to exposure of sensitive business information, intellectual property, or customer data, potentially resulting in regulatory non-compliance under GDPR and other data protection laws. The breach of confidentiality could also damage organizational reputation and trust. Since the vulnerability allows low-privileged users to bypass controls, insider threats or compromised accounts could be leveraged to exploit this flaw. The availability and integrity of storage systems could also be indirectly impacted if unauthorized access leads to malicious configuration changes or data manipulation. Given the critical role of RAID controllers in data redundancy and performance, exploitation could disrupt business continuity. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict access to the Broadcom LSI Storage Authority web interface to trusted administrative networks only, using network segmentation and firewall rules. 2) Enforce strong authentication and authorization policies, ensuring that only necessary personnel have access to the management interface. 3) Monitor and audit all access to the RAID controller management interface for unusual or unauthorized activity, employing SIEM solutions where possible. 4) Engage with Broadcom support channels to obtain patches or updates addressing CVE-2023-4345 as soon as they become available. 5) Consider deploying web application firewalls (WAFs) or reverse proxies to add an additional layer of control and inspection for management interface traffic. 6) Educate administrators about the risks of client-side control bypass and encourage vigilance against social engineering or phishing attacks that could lead to credential compromise. 7) Regularly review and update access control configurations on the RAID management systems to minimize exposure. These steps go beyond generic advice by focusing on network-level restrictions, monitoring, and vendor engagement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
certcc
Date Reserved
2023-08-14T21:30:09.111Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a2de3f0ba78a050535ceb

Added to database: 11/4/2025, 4:46:27 PM

Last enriched: 11/4/2025, 4:58:44 PM

Last updated: 11/6/2025, 1:53:16 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats