Remote code execution (RCE) vulnerability in Brocade Fabric OS (CVE-2023-3454)

Brocade Fabric OS

0 more products

23215

03 June 2024

04 April 2024

CLOSED

HIGH

8.6 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

N/A

CVE-2023-3454

Brocade Security Advisory ID

BSA-2023-2505

Component

FWDL

 

 

Summary

Remote code execution (RCE) vulnerability in Brocade Fabric OS after v9.0 and before v9.2.0 could allow a remote unauthenticated attacker to execute arbitrary code and use this to gain root access to the switch.

Products Affected

Brocade Fabric OS v9.x to v9.2.0

Products Confirmed Not Affected

Brocade Fabric v8.x and below are not affected

Solution

The security update is provided in Brocade Fabric OS v9.2.0, v9.1.1d1, and later releases.

Credit

  • The issue was found during internal penetration testing
  • The issue was also reported by Omar Eissa (https://de.linkedin.com/in/oeissa)
  • Pierre Barre also reported this issue to Brocade

 Revision History

Version

Change

Date

1.0

Initial Publication

4/1/2024

1.1

added Release v9.1.1d1 

5/20/2024

1.2

added credit to Pierre Barre

6/3/2024

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.