Identical SSH keys utilized inside the OVA image (CVE-2024-29960)

Brocade SANnav

0 more products

23244

30 April 2024

17 April 2024

CLOSED

MEDIUM

6.8 - CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2024-29960

Brocade Security Advisory ID

BSA-2024-2559

Component

SSH Key

 

 

Summary

In Brocade SANnav server before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are identical in the VM every time SANnav is installed. Any Brocade SAnnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav.

Products Affected

Brocade SANnav before v2.3.0a

Solution

The security update is provided in Brocade v2.3.0a, v2.3.1 and later releases.

Workaround

  • Delete the SSH keys delivered in the OVA install, upon next login, new SSH keys will be generated

Note

  • Prior versions of SANnav (v2.1.1 and prior) that are no longer supported are at a higher risk

Credit

  • The issue was found during internal penetration testing.
  • Pierre Barre also reported this issue to Brocade.

 Revision History

Version

Change

Date

1.0

Initial Publication

04/17/2024

2.0

Provided clarification on work-around and provided note about prior versions, and updated severity to reflect existing supported versions

4/26/2024

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.