A flaw exists in FlashBlade Purity whereby an authenticated user with access to FlashBlade’s object store protocol can impact the availability of the system’s data access and replication protocols.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.7 |
References | () https://support.purestorage.com/Employee_Handbooks/Technical_Services/PSIRT/Security_Bulletin_for_FlashBlade_Object_Store_Protocol_CVE-2023-31042 - Vendor Advisory |
05 Oct 2023, 15:46
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
First Time |
Purestorage
Purestorage purity |
|
References | (MISC) https://support.purestorage.com/Employee_Handbooks/Technical_Services/PSIRT/Security_Bulletin_for_FlashBlade_Object_Store_Protocol_CVE-2023-31042 - Vendor Advisory | |
CPE | cpe:2.3:a:purestorage:purity:*:*:*:*:*:*:*:* |
02 Oct 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-02 23:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31042
Mitre link : CVE-2023-31042
CVE.ORG link : CVE-2023-31042
JSON object : View
Products Affected
purestorage
- purity
CWE