CVE-2022-23232

StorageGRID (formerly StorageGRID Webscale) versions prior to 11.6.0 are susceptible to a vulnerability which when successfully exploited could allow disabled, expired, or locked external user accounts to access S3 data to which they previously had access. StorageGRID 11.6.0 obtains the user account status from Active Directory or Azure and will block S3 access for disabled user accounts during the subsequent background synchronization. User accounts that are expired or locked for Active Directory or Azure, or user accounts that are disabled, expired, or locked in identity sources other than Active Directory or Azure must be manually removed from group memberships or have their S3 keys manually removed from Tenant Manager in all versions of StorageGRID (formerly StorageGRID Webscale).
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*

History

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-287 NVD-CWE-noinfo

11 Mar 2022, 15:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 4.9
CPE cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
First Time Netapp
Netapp storagegrid
References (MISC) https://security.netapp.com/advisory/NTAP-20220303-0009/ - (MISC) https://security.netapp.com/advisory/NTAP-20220303-0009/ - Vendor Advisory
CWE CWE-287

04 Mar 2022, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-04 18:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-23232

Mitre link : CVE-2022-23232

CVE.ORG link : CVE-2022-23232


JSON object : View

Products Affected

netapp

  • storagegrid