CVE-2025-0051

| EUVD-2025-17716 HIGH
2025-06-10 [email protected]
8.7
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17716
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
CVE Published
Jun 10, 2025 - 18:15 nvd
HIGH 8.7

DescriptionNVD

Improper input validation performed during the authentication process of FlashArray could lead to a system Denial of Service.

AnalysisAI

Improper input validation vulnerability in Pure Storage FlashArray's authentication process that enables unauthenticated network-based denial of service attacks. The vulnerability allows remote attackers without credentials to crash or degrade the availability of affected FlashArray systems by sending malformed authentication requests. This is a high-severity issue (CVSS 8.7) with network accessibility and no authentication requirements, making it broadly exploitable across internet-exposed or network-accessible FlashArray deployments.

Technical ContextAI

The vulnerability resides in FlashArray's authentication handler, which fails to properly validate and sanitize input during the initial authentication phase. The root cause is classified as CWE-20 (Improper Input Validation), indicating that the authentication mechanism does not adequately filter, verify, or canonicalize untrusted data before processing. This likely occurs in the authentication protocol handler (possibly REST API or management interface) where malformed requests bypass validation checks and trigger unhandled exceptions or resource exhaustion conditions. The attack vector is Network (AV:N) with Low complexity (AC:L), meaning the flaw can be triggered remotely over standard network protocols without special conditions or user interaction.

RemediationAI

  1. IMMEDIATE: Implement network-level access controls to restrict access to FlashArray management interfaces and APIs to authorized IP ranges only. 2. PATCH: Monitor Pure Storage security advisories (https://support.purestorage.com) for patched FlashArray versions addressing CVE-2025-0051 and deploy as soon as available. 3. WORKAROUND: Deploy a WAF (Web Application Firewall) or authentication proxy in front of FlashArray to sanitize malformed authentication requests before reaching the system. 4. DETECTION: Enable audit logging on FlashArray to identify suspicious authentication attempts with malformed payloads and monitor for resource exhaustion indicators. 5. VALIDATION: After patching, verify proper input validation by reviewing security advisories for specific validation checks implemented.

Share

CVE-2025-0051 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy