Remote code execution (RCE) vulnerability in Brocade Fabric OS (CVE-2023-3454)
23215
03 June 2024
04 April 2024
CLOSED
HIGH
8.6 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
N/A
CVE-2023-3454
Brocade Security Advisory ID |
BSA-2023-2505 |
Component |
FWDL |
|
|
Summary
Remote code execution (RCE) vulnerability in Brocade Fabric OS after v9.0 and before v9.2.0 could allow a remote unauthenticated attacker to execute arbitrary code and use this to gain root access to the switch.
Products Affected
Brocade Fabric OS v9.x to v9.2.0
Products Confirmed Not Affected
Brocade Fabric v8.x and below are not affected
Solution
The security update is provided in Brocade Fabric OS v9.2.0, v9.1.1d1, and later releases.
Credit
- The issue was found during internal penetration testing
- The issue was also reported by Omar Eissa (https://de.linkedin.com/in/oeissa)
- Pierre Barre also reported this issue to Brocade
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
4/1/2024 |
1.1 |
added Release v9.1.1d1 |
5/20/2024 |
1.2 |
added credit to Pierre Barre |
6/3/2024 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.