An Improper Input Validation vulnerability for the registered case credentials (CVE-2023-5649)

Brocade Fabric OS

2 more products

22716

07 November 2023

07 November 2023

CLOSED

MEDIUM

5.0 MEDIUM - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

CVE-2023-5649

Brocade Security Advisory ID

BSA-2023-2431

Component

supportsave

 

 

Summary

An Improper Input Validation vulnerability for the registered case credentials in Brocade ASCG before v3.0 could allow a local authenticated user to provide invalid inputs like special characters leading to a Denial of Service (DoS) when collecting “supportsave” from a Brocade Switch.

Products Affected

  • Brocade Active Support Connectivity Gateway (ASC-G) versions before v3.0

Products Confirmed Not Affected

  • Brocade Fabric OS
  • Brocade SANnav

Solution

Brocade has released security updates that address the vulnerabilities described in this advisory. Broade Customers should obtain the security updates through their usual update channels.

Credit

The issue was discovered through internal security testing.

Revision History

Version

Change

Date

1.0

Initial Publication

November 7, 2023

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.