An Improper Input Validation vulnerability for the registered case credentials (CVE-2023-5649)
22716
07 November 2023
07 November 2023
CLOSED
MEDIUM
5.0 MEDIUM - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
CVE-2023-5649
Brocade Security Advisory ID |
BSA-2023-2431 |
Component |
supportsave |
|
|
Summary
An Improper Input Validation vulnerability for the registered case credentials in Brocade ASCG before v3.0 could allow a local authenticated user to provide invalid inputs like special characters leading to a Denial of Service (DoS) when collecting “supportsave” from a Brocade Switch.
Products Affected
- Brocade Active Support Connectivity Gateway (ASC-G) versions before v3.0
Products Confirmed Not Affected
- Brocade Fabric OS
- Brocade SANnav
Solution
Brocade has released security updates that address the vulnerabilities described in this advisory. Broade Customers should obtain the security updates through their usual update channels.
Credit
The issue was discovered through internal security testing.
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
November 7, 2023 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.