Identical SSH keys utilized inside the OVA image (CVE-2024-29960)
23244
30 April 2024
17 April 2024
CLOSED
MEDIUM
6.8 - CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-29960
Brocade Security Advisory ID |
BSA-2024-2559 |
Component |
SSH Key |
|
|
Summary
In Brocade SANnav server before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are identical in the VM every time SANnav is installed. Any Brocade SAnnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav.
Products Affected
Brocade SANnav before v2.3.0a
Solution
The security update is provided in Brocade v2.3.0a, v2.3.1 and later releases.
Workaround
- Delete the SSH keys delivered in the OVA install, upon next login, new SSH keys will be generated
Note
- Prior versions of SANnav (v2.1.1 and prior) that are no longer supported are at a higher risk
Credit
- The issue was found during internal penetration testing.
- Pierre Barre also reported this issue to Brocade.
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
04/17/2024 |
2.0 |
Provided clarification on work-around and provided note about prior versions, and updated severity to reflect existing supported versions |
4/26/2024 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.