A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches (CVE-2024-29965).

Brocade SANnav

0 more products

23250

30 April 2024

17 April 2024

CLOSED

MEDIUM

6.8 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N

CVE-2024-29965

Brocade Security Advisory ID

BSA-2024-2565

Component

Backup

 

 

Summary

In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.

Note: The backup file contains several configuration files, including passwords, the entire database with the admin users, and the switches' configuration.
An attacker with local access to the appliance can recover backup files and restore them to a new malicious appliance. The attacker can then do an air-gapped analysis by sniffing the malicious appliance's network interface and retrieving the passwords of all the switches. Reverse engineering of the custom encryption mechanism can also retrieve the passwords.

Products Affected

Brocade SANnav before v2.3.0a

Solution

The security update is provided in Brocade v2.3.1, v2.3.0a, and later releases.

Credit

Pierre Barre reported the issue to Brocade.

 Revision History

Version

Change

Date

1.0

Initial Publication

4/11/2024

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.