// For flags

CVE-2022-32553

 

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Pure Storage FlashArray products running Purity//FA 6.2.0 - 6.2.3, 6.1.0 - 6.1.12, 6.0.0 - 6.0.8, 5.3.0 - 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 - 3.2.4, 3.1.0 - 3.1.12, 3.0.x and prior Purity//FB releases are vulnerable to a privilege escalation via the manipulation of environment variables which can be exploited by a logged-in user to escape a restricted shell to an unrestricted shell with root privileges. No other Pure Storage products or services are affected. Remediation is available from Pure Storage via a self-serve “opt-in” patch, manual patch application or a software upgrade to an unaffected version of Purity software.

Los productos Pure Storage FlashArray que ejecutan Purity//FA versiones 6.2.0 - 6.2.3, 6.1.0 - 6.1.12, 6.0.0 - 6.0.8, 5.3.0 - 5.3.17, 5.2.x y versiones anteriores de Purity//FA, y los productos Pure Storage FlashBlade que ejecutan Purity//FB versiones 3.3.0, 3.2.0 - 3.2.4, 3.1.0 - 3.1. 12, 3.0.x y versiones anteriores de Purity//FB son vulnerables a una escalada de privilegios por medio de la manipulación de variables de entorno que puede ser explotada por un usuario conectado para escapar de un shell restringido a un shell sin restricciones con privilegios de root. Ningún otro producto o servicio de Pure Storage está afectado. La mitigación está disponible en Pure Storage por medio de un parche de autoservicio "opt-in", la aplicación de un parche manual o una actualización de software a una versión no afectada del software Purity

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-06-08 CVE Reserved
  • 2022-06-22 CVE Published
  • 2024-01-13 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Purestorage
Search vendor "Purestorage"
Purity\/\/fa
Search vendor "Purestorage" for product "Purity\/\/fa"
< 5.3.18
Search vendor "Purestorage" for product "Purity\/\/fa" and version " < 5.3.18"
-
Affected
Purestorage
Search vendor "Purestorage"
Purity\/\/fa
Search vendor "Purestorage" for product "Purity\/\/fa"
>= 6.0.0 < 6.0.9
Search vendor "Purestorage" for product "Purity\/\/fa" and version " >= 6.0.0 < 6.0.9"
-
Affected
Purestorage
Search vendor "Purestorage"
Purity\/\/fa
Search vendor "Purestorage" for product "Purity\/\/fa"
>= 6.1.0 < 6.1.13
Search vendor "Purestorage" for product "Purity\/\/fa" and version " >= 6.1.0 < 6.1.13"
-
Affected
Purestorage
Search vendor "Purestorage"
Purity\/\/fa
Search vendor "Purestorage" for product "Purity\/\/fa"
>= 6.2.0 < 6.2.4
Search vendor "Purestorage" for product "Purity\/\/fa" and version " >= 6.2.0 < 6.2.4"
-
Affected
Purestorage
Search vendor "Purestorage"
Purity\/\/fb
Search vendor "Purestorage" for product "Purity\/\/fb"
< 3.1.13
Search vendor "Purestorage" for product "Purity\/\/fb" and version " < 3.1.13"
-
Affected
Purestorage
Search vendor "Purestorage"
Purity\/\/fb
Search vendor "Purestorage" for product "Purity\/\/fb"
>= 3.2.0 < 3.2.5
Search vendor "Purestorage" for product "Purity\/\/fb" and version " >= 3.2.0 < 3.2.5"
-
Affected
Purestorage
Search vendor "Purestorage"
Purity\/\/fb
Search vendor "Purestorage" for product "Purity\/\/fb"
>= 3.3.0 < 3.3.1
Search vendor "Purestorage" for product "Purity\/\/fb" and version " >= 3.3.0 < 3.3.1"
-
Affected