The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution (CVE-2023-38408)

Brocade Fabric OS

2 more products

22721

07 November 2023

07 November 2023

CLOSED

MEDIUM

9.8 CRITICAL - Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2023-38408

Brocade Security Advisory ID

BSA-2023-2322

Component

OpenSSH

 

 

Summary

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

Products Affected

  • The vulnerability affects the underlying OS  of Brocade ASCG - Security update provided in Brocade ASCG v3.0 OVA.

Products Confirmed Not Affected

  • Brocade Fabric OS
  • Brocade SANnav

Solution

Brocade has released security updates that address the vulnerabilities described in this advisory. Brocade Customers should obtain the security updates through their usual update channels.

While FOS is not exposed, future releases of Brocade Fabric OS will remove the vulnerable component to avoid false positive detections from security scanners

Credit

The issue was discovered during security testing.

Revision History

Version

Change

Date

1.0

Initial Publication

November 7, 2023

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.