Privileged escalation via crafted use of portcfg command

Brocade Fabric OS

0 more products

25071

12 November 2024

12 November 2024

CLOSED

HIGH

8.5 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CVE-2024-7517

Brocade Security Advisory ID

BSA-2024-2731

Component

IPSEC

 

 

Summary 

A command injection vulnerability in Brocade Fabric OS before 9.2.0c, and 9.2.1 through 9.2.1a on IP extension platforms could allow a local authenticated attacker to perform a privileged escalation via crafted use of the portcfg command.

This specific exploitation is only possible on IP Extension platforms: Brocade 7810, Brocade 7840, Brocade 7850 and on Brocade X6 or X7 directors with an SX-6 Extension blade installed. The attacker must be logged into the switch via SSH or serial console to conduct the attack.

Products Affected

Brocade Fabric OS versions before 9.2.0c, and 9.2.1 through 9.2.1a

Products Not Affected

Brocade SANnav is not affected by this vulnerability [VEX Justification: Component_not_present]

Brocade ASCG is not affected by this vulnerability [VEX Justification: Component_not_present]

Solution

Security update provided in Brocade Fabric OS versions 8.2.3e2, 9.2.0c, 9.2.1a1 and 9.2.2

 

 

Revision History

Version

Change

Date

1.0

Initial Publication

November 12, 2024

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.