A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches (CVE-2024-29965).
23250
30 April 2024
17 April 2024
CLOSED
MEDIUM
6.8 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
CVE-2024-29965
Brocade Security Advisory ID |
BSA-2024-2565 |
Component |
Backup |
|
|
Summary
In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.
Note: The backup file contains several configuration files, including passwords, the entire database with the admin users, and the switches' configuration.
An attacker with local access to the appliance can recover backup files and restore them to a new malicious appliance. The attacker can then do an air-gapped analysis by sniffing the malicious appliance's network interface and retrieving the passwords of all the switches. Reverse engineering of the custom encryption mechanism can also retrieve the passwords.
Products Affected
Brocade SANnav before v2.3.0a
Solution
The security update is provided in Brocade v2.3.1, v2.3.0a, and later releases.
Credit
Pierre Barre reported the issue to Brocade.
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
4/11/2024 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.