SFTP/FTP password could be captured in plain text in Supportsave generated from SANnav

Brocade Fabric OS

0 more products

25145

12 November 2024

12 November 2024

OPEN

HIGH

5.9 - CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

CVE-2024-10403

Brocade Security Advisory ID

BSA-2024-2763

Component

weblinker

 

 

Summary

Brocade Fabric OS versions before 8.2.3e2, versions 9.0.0 through 9.2.0c, and 9.2.1 through 9.2.1a can capture the SFTP/FTP server password used for a firmware download operation initiated by SANnav or through WebEM in a weblinker core dump that is later captured via supportsave.

Description

The username and password of the SFTP/FTP server are supplied by SANnav, WebEM or REST API to FOS in order to complete the file transfer of RPM files needed for a firmware download operation. This user name and password information is kept in memory and could be captured if the weblinker daemon crashes and generates a core dump. The core dump is contained in the next SupportSave upload.

A solution to remove the username and password information stored in the low level library will prevent exposure provided that any weblinker daemon crash and core file generations happens after the firmware download operation completes, the processor reboots and Fabric OS is fully up and running.

Products Affected

  • Brocade Fabric OS versions before 8.2.3e2, versions 9.0.0 through 9.2.0c, and 9.2.1 through 9.2.1a 

Products Not Affected

  • Brocade ASCG is not affected by this vulnerability
  • Brocade SANnav is not affected by this vulnerability

Solution

  • Security update provided in Brocade Fabric OS 9.2.0c1, 9.2.1a1 and 9.2.2. 

Credit

The issue was found during internal testing.



 

Revision History

Version

Change

Date

1.0

Initial Publication

November 12, 2024

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.