Brocade Fabric OS (8.2.3x Release) Vulnerability Disclosures

24997

12 December 2024

12 December 2024

OPEN

HIGH

Varies

Multiple

Brocade Security Advisories

 

 

==================================================

Previously disclosed Brocade Security Advisories in 8.2.3x releases

CVEs addressed in FOS v8.2.3e1

CVE-2024-5461
Command or parameter injection via unique embedded switch SNMP commands
(PSIRT Risk: High)

https://support.broadcom.com/external/content/SecurityAdvisories/0/24411

 

CVEs addressed in FOS v8.2.3e

CVE-2024-29954
password management API prints sensitive information in log files
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/23226

 

CVE-2023-31431
A buffer overflow vulnerability in “diagstatus” command
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/22384


CVE-2023-31430
buffer overflow vulnerability in “secpolicydelete” command
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/22381


CVE-2023-26555, CVE-2023-26554, CVE-2023-26553, CVE-2023-26552, CVE-2023-26551
Multiple NTP vulnerabilities resolved
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/23228


CVE-2023-4163
Possible buffer overflow in portcfgfportbuffers in Brocade Fabric OS
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/22514



CVE-2023-4162
A segmentation fault can occur in Brocade Fabric OS through the passwdcfg command
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/22513


CVE-2023-3446
Excessive time spent checking DH keys and parameters
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/23231


CVE-2023-2650
Possible DoS translating ASN.1 object identifiers
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/23233


CVE-2023-3817
Excessive time spent checking DH q parameter value
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/23230


CVE-2022-25235
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation
(PSIRT Risk: Low)
https://support.broadcom.com/external/content/SecurityAdvisories/0/22403



 

CVEs addressed in FOS v8.2.3d

CVE-2023-31426
scp, sftp, ftp servers passwords in supportsave
(PSIRT Risk: High)
https://support.broadcom.com/external/content/SecurityAdvisories/0/22377


CVE-2022-24448
nfs_atomic_open() performs a regular lookup
(PSIRT Risk: Low)
https://support.broadcom.com/external/content/SecurityAdvisories/0/22349


CVE-2022-0778
Infinite loop in BN_mod_sqrt() reachable when parsing certificates
(PSIRT Risk: Low)
https://support.broadcom.com/external/content/SecurityAdvisories/0/21226

 

CVE-2020-36558
A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/22392


CVE-2020-36557
Linux kernel before 5.6.2 between the VT_DISALLOCATE ioctl and closing opening of ttys could lead to a use-after-free
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/22378

 

CVE-2018-14404
NULL pointer dereference in libxml2 through 2.9.8
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/22405


CVE-2018-7738
Potential privilege escalation by embedding shell commands in a mountpoint name
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/22341



CVEs addressed in FOS v8.2.3c1

CVE-2021-33186
EZServer module vulnerability
(PSIRT Risk: Critical)
https://support.broadcom.com/external/content/SecurityAdvisories/0/21217




CVEs addressed in FOS v8.2.3c

CVE-2022-33184
Stack-based buffer overflows, allowing the execution of arbitrary code
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/21231


CVE-2022-33183
Stack buffer overflow using in "firmwaredownload" and "diagshow" commands
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/21235


CVE-2022-33182
Privilege escalation using switch commands "supportlink", "firmwaredownload", "portcfgupload","license", and "fosexec"
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/21236


CVE-2022-33181
Information disclosure vulnerability in Brocade Fabric OS CLI using switch commands "configshow" and "supportlink"
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/21234


CVE-2022-33180
Sensitive files export
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/21233


CVE-2022-33179
A vulnerability in Brocade Fabric OS CLI could allow an attacker to break out of restricted shells and escalate privileges
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21232


CVE-2022-28170
Brocade Fabric OS Web Application services store server and user passwords in the debug statements
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21229


CVE-2022-28169
Brocade Fabric OS Privilege Escalation Vulnerability
(PSIRT Risk: High)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21238


CVE-2021-39275
ap_escape_quotes buffer overflow
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21227


CVE-2021-34798
NULL pointer dereference in httpd core
(PSIRT Risk: High)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21248

 

CVE-2021-23841
Null pointer deref in X509_issuer_and_serial_hash()
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21247

 

CVE-2019-9169
Heap-based buffer over-read in the GNU C Library
(PSIRT Risk: Low)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21213

 

CVE-2018-0739
DOS for Handling of crafted recursive ASN.1 structures
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/22347

 

CVE-2018-0732
Client DoS due to large DH parameter
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21249

 

 

 

CVEs addressed in FOS v8.2.3a

CVE-2021-27794
A vulnerability in the authentication mechanism could allow a user to Login with empty password, and invalid password through telnet, ssh and REST
(PSIRT Risk: High)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21317

 

CVE-2021-27793
Intermittent authorization failure in aaa tacacs+
(PSIRT Risk: Medium)
https://support.broadcom.com/external/content/SecurityAdvisories/0/21318

 

CVE-2021-27792
The request handling functions in web management interface do not properly handle malformed user input
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21316

 

CVE-2021-27791
The function that is used to parse the Authentication header fails to properly process a malformed authentication header from the client
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21583

 

CVE-2020-15388
The Web application of Brocade Fabric OS before versions Brocade Fabric OS v9.0.1a and v8.2.3a contains debug statements that expose sensitive information to the program's standard output device
(PSIRT Risk: Low)
https://support.broadcom.com/external/content/SecurityAdvisories/0/21582

 

CVE-2020-15386
May observe high CPU load during security scanning, which could lead to a slower response to CLI commands and other operations
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21691

 

CVE-2020-1971
OpenSSL X.509 GeneralName type is a generic type
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21584

 

CVE-2019-11479
Linux kernel default MSS is hard-coded to 48 bytes
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21578

 



CVEs addressed in FOS v8.2.3

CVE-2021-27790
The command "ipfilter" in Brocade Fabric OS uses unsafe string function to process user input
(PSIRT Risk: High)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21315

CVE-2021-27789
FOS ould allow an authenticated CLI user to abuse the history command to write arbitrary content to files
(PSIRT Risk: High)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21313

 

CVE-2021-3449
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21314

 

CVE-2018-6449
Host Header Injection vulnerability in the http management interface in Brocade Fabric OS could allow a remote attacker to exploit this vulnerability by injecting arbitrary HTTP headers
(PSIRT Risk: Medium)

https://support.broadcom.com/external/content/SecurityAdvisories/0/21344

 

 

 

 

Revision History

Version

Change

Date

1.0

Initial Publication

December 12, 2024

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.