Privileged escalation via crafted use of portcfg command
25071
12 November 2024
12 November 2024
CLOSED
HIGH
8.5 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVE-2024-7517
Brocade Security Advisory ID |
BSA-2024-2731 |
Component |
IPSEC |
|
|
Summary
A command injection vulnerability in Brocade Fabric OS before 9.2.0c, and 9.2.1 through 9.2.1a on IP extension platforms could allow a local authenticated attacker to perform a privileged escalation via crafted use of the portcfg command.
This specific exploitation is only possible on IP Extension platforms: Brocade 7810, Brocade 7840, Brocade 7850 and on Brocade X6 or X7 directors with an SX-6 Extension blade installed. The attacker must be logged into the switch via SSH or serial console to conduct the attack.
Products Affected
Brocade Fabric OS versions before 9.2.0c, and 9.2.1 through 9.2.1a
Products Not Affected
Brocade SANnav is not affected by this vulnerability [VEX Justification: Component_not_present]
Brocade ASCG is not affected by this vulnerability [VEX Justification: Component_not_present]
Solution
Security update provided in Brocade Fabric OS versions 8.2.3e2, 9.2.0c, 9.2.1a1 and 9.2.2
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
November 12, 2024 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.