CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
98.4%
Vulnerabilities in libssh, nginx and nghttp2 affect IBM Storage Virtualize products and could cause denial of service and bypassing of authentication. CVE-2023-44487, CVE-2023-1667, CVE-2023-2283.
CVEID:CVE-2023-44487
**DESCRIPTION:**Multiple vendors are vulnerable to a denial of service, caused by a flaw in handling multiplexed streams in the HTTP/2 protocol. By sending numerous HTTP/2 requests and RST_STREAM frames over multiple streams, a remote attacker could exploit this vulnerability to cause a denial of service due to server resource consumption.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/268044 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVEID:CVE-2023-1667
**DESCRIPTION:**libssh is vulnerable to a denial of service, caused by a NULL pointer dereference during rekeying with algorithm guessing. A remote authenticated attacker could exploit this vulnerability to cause the daemon to crash.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/256622 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
CVEID:CVE-2023-2283
**DESCRIPTION:**libssh could allow a remote attacker to bypass security restrictions, caused by a memory allocation flaw in thepki_verify_data_signature function. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass the authentication check of the connecting client.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/257617 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM Storage Virtualize | 8.4 |
IBM Storage Virtualize | 8.5 |
IBM Storage Virtualize | 8.6 |
IBM recommends that you fix this vulnerability by upgrading affected versions of IBM SAN Volume Controller, IBM Storwize V7000, IBM Storwize V5000 and V5100, IBM Storwize V5000E, IBM Spectrum Virtualize Software, IBM Spectrum Virtualize for Public Cloud, IBM FlashSystem V9000, IBM FlashSystem 9500, IBM FlashSystem 9100 Family, IBM FlashSystem 9200, IBM FlashSystem 7300, IBM FlashSystem 7200, IBM FlashSystem 5200 and IBM FlashSystem 5000 to the following code levels or higher:
8.4.0.14
8.5.0.12
8.6.0.4
8.7.0.0
Latest IBM SAN Volume Controller Code
Latest IBM Storwize V7000 Code
Latest IBM Storwize V5000 and V5100 Code
Latest IBM Storwize V5000E Code
Latest IBM FlashSystem V9000 Code
Latest IBM FlashSystem 9500 Code
Latest IBM FlashSystem 9100 Family Code
Latest IBM FlashSystem 9200 Code
Latest IBM FlashSystem 7300 Code
Latest IBM FlashSystem 7200 Code
Latest IBM FlashSystem 5000 and 5200 Code
Latest IBM Spectrum Virtualize Software
Latest IBM Spectrum Virtualize for Public Cloud
None
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | san_volume_controller | 8.4 | cpe:2.3:h:ibm:san_volume_controller:8.4:*:*:*:*:*:*:* |
ibm | san_volume_controller | 8.5 | cpe:2.3:h:ibm:san_volume_controller:8.5:*:*:*:*:*:*:* |
ibm | san_volume_controller | 8.6 | cpe:2.3:h:ibm:san_volume_controller:8.6:*:*:*:*:*:*:* |
ibm | storwize_v7000 | 8.4 | cpe:2.3:h:ibm:storwize_v7000:8.4:*:*:*:*:*:*:* |
ibm | storwize_v7000 | 8.5 | cpe:2.3:h:ibm:storwize_v7000:8.5:*:*:*:*:*:*:* |
ibm | storwize_v7000 | 8.6 | cpe:2.3:h:ibm:storwize_v7000:8.6:*:*:*:*:*:*:* |
ibm | ibm_flashsystem_7300 | 8.4 | cpe:2.3:a:ibm:ibm_flashsystem_7300:8.4:*:*:*:*:*:*:* |
ibm | ibm_flashsystem_7300 | 8.5 | cpe:2.3:a:ibm:ibm_flashsystem_7300:8.5:*:*:*:*:*:*:* |
ibm | ibm_flashsystem_7300 | 8.6 | cpe:2.3:a:ibm:ibm_flashsystem_7300:8.6:*:*:*:*:*:*:* |
ibm | flashsystem_v9000 | 8.4 | cpe:2.3:h:ibm:flashsystem_v9000:8.4:*:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
98.4%