First published: Fri Mar 04 2022(Updated: )
StorageGRID (formerly StorageGRID Webscale) versions prior to 11.6.0 are susceptible to a vulnerability which when successfully exploited could allow disabled, expired, or locked external user accounts to access S3 data to which they previously had access. StorageGRID 11.6.0 obtains the user account status from Active Directory or Azure and will block S3 access for disabled user accounts during the subsequent background synchronization. User accounts that are expired or locked for Active Directory or Azure, or user accounts that are disabled, expired, or locked in identity sources other than Active Directory or Azure must be manually removed from group memberships or have their S3 keys manually removed from Tenant Manager in all versions of StorageGRID (formerly StorageGRID Webscale).
Credit: security-alert@netapp.com security-alert@netapp.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netapp Storagegrid | <11.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-23232.
The affected software is Netapp Storagegrid versions prior to 11.6.0.
The severity of CVE-2022-23232 is medium with a CVSS score of 4.9.
Disabled, expired, or locked external user accounts can access S3 data if they had previous access to it.
To fix CVE-2022-23232, you should upgrade Netapp Storagegrid to version 11.6.0 or later.