Lucene search

K
ibmIBME33E7DB6B76F4B803D5B1A6AE5F470E7A7494171289337838EA7D4B542813620
HistoryNov 01, 2023 - 8:00 p.m.

Security Bulletin: IBM Storage Ceph is vulnerable to improper verification of cryptographic signature in Grafana (CVE-2022-31123)

2023-11-0120:00:15
www.ibm.com
6
ibm
storage
ceph
vulnerable
grafana
signature bypass
cve-2022-31123
authentication
plugin
verification
security
restrictions
attack
download
upgrade

6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.4%

Summary

Grafana is used by IBM Ceph Storage as part of the dashboard to monitor the stats for each cluster. CVE-2022-31123

Vulnerability Details

CVEID:CVE-2022-31123
**DESCRIPTION:**Grafana could allow a local authenticated attacker to bypass security restrictions, caused by an error in the plugin signature verification. An attacker could exploit this vulnerability to convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed.
CVSS Base score: 6.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/238624 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Storage Ceph <6.1
IBM Storage Ceph 5.3z1-z4

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.
Download the latest version of IBM Storage Ceph and upgrade to 6.1 by following instructions.

<https://public.dhe.ibm.com/ibmdl/export/pub/storage/ceph/&gt;
<https://www.ibm.com/docs/en/storage-ceph/6?topic=upgrading&gt;

Workarounds and Mitigations

None

6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.4%