CVE-2023-43029
Published: 21 March 2025
Summary
CVE-2023-43029 is a medium-severity Cleartext Storage of Sensitive Information in an Environment Variable (CWE-526) vulnerability in Ibm Storage Virtualize Plugin For Vsphere. Its CVSS base score is 6.8 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unsecured Credentials (T1552); ranked at the 18.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring timely remediation of the software flaw in the vSphere plug-in that exposes sensitive credentials to remote high-privilege users.
Enforces least privilege to prevent high-privilege (PR:H) remote users from accessing sensitive credential information unless explicitly required.
Protects the management, storage, and handling of authenticators to prevent exposure of sensitive credential information post-deployment.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability involves cleartext storage of sensitive credentials (CWE-526) in the deployed plug-in, directly enabling adversaries to obtain unsecured credentials.
NVD Description
IBM Storage Virtualize vSphere Remote Plug-in 1.0 and 1.1 could allow a remote user to obtain sensitive credential information after deployment.
Deeper analysisAI
CVE-2023-43029 is a vulnerability in IBM Storage Virtualize vSphere Remote Plug-in versions 1.0 and 1.1 that could allow a remote user to obtain sensitive credential information after deployment. Classified under CWE-526, it carries a CVSS v3.1 base score of 6.8 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N), indicating medium severity with high confidentiality impact and changed scope.
The vulnerability can be exploited by a remote attacker who possesses high privileges (PR:H). Exploitation requires low attack complexity over the network with no user interaction, enabling the attacker to access sensitive credential information without impacting integrity or availability.
IBM has published a security advisory detailing the issue at https://www.ibm.com/support/pages/node/7228722.
Details
- CWE(s)