CVE-2025-0052

| EUVD-2025-17757 HIGH
2025-06-10 [email protected]
8.3
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17757
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
CVE Published
Jun 10, 2025 - 18:15 nvd
HIGH 8.3

DescriptionNVD

Improper input validation performed during the authentication process of FlashBlade could lead to a system Denial of Service.

AnalysisAI

CVE-2025-0052 is an improper input validation vulnerability in Pure Storage FlashBlade's authentication process that allows unauthenticated network attackers to trigger a denial of service condition with high availability impact. While the CVSS score of 8.3 reflects significant availability risk, the high attack complexity (AC:H) suggests practical exploitation requires specific conditions. No confirmed KEV/CISA status, active exploitation, or public POC has been disclosed at the time of analysis.

Technical ContextAI

The vulnerability exists in FlashBlade's authentication handler, which implements insufficient input validation against malformed or oversized authentication payloads (CWE-20: Improper Input Validation). FlashBlade is Pure Storage's NVMe-over-Fabrics flash storage appliance accessed via network protocols (likely iSCSI, NVMe/TCP, or REST APIs). The authentication process, likely implemented in the device's management plane or storage protocol stack, fails to properly sanitize or bound-check authentication request parameters, allowing attackers to supply crafted inputs that exhaust system resources (memory, CPU, connections) or trigger exception handlers that crash services. The high attack complexity suggests the payload requires specific formatting, timing, or system state to succeed, rather than simple fuzzing.

RemediationAI

  1. Immediate: Isolate or restrict network access to FlashBlade management and protocol interfaces (REST API, iSCSI portal, NVMe/TCP endpoints) via firewall rules, VLANs, or network segmentation to trusted subnets only. 2. Short-term: Apply vendor-supplied security patch from Pure Storage (link to advisory required; expected release via Pure Storage support portal or security.purestorage.com). Check for patch availability via Pure Storage security advisories matching CVE-2025-0052. 3. Workarounds pending patch: Implement rate-limiting on authentication attempts, enable authentication logging/alerting for malformed requests, monitor for DoS indicators (connection resets, service crashes). 4. Validation: After patching, verify input validation is applied to authentication payloads by reviewing patch release notes and re-testing with malformed inputs.

Share

CVE-2025-0052 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy