Extreme Flaws Disclosed in Brocade SANnav SAN Administration Software program

A number of safety vulnerabilities disclosed in Brocade SANnav storage space community (SAN) administration utility may very well be exploited to compromise vulnerable home equipment.

The 18 flaws influence all variations as much as and together with 2.3.0, in response to impartial safety researcher Pierre Barre, who found and reported them.

The problems vary from incorrect firewall guidelines, insecure root entry, and Docker misconfigurations to lack of authentication and encryption, thus permitting an attacker to intercept credentials, overwrite arbitrary recordsdata, and utterly breach the gadget.

A few of the most extreme flaws are listed beneath –

  • CVE-2024-2859 (CVSS rating: 8.8) – A vulnerability that would enable an unauthenticated, distant attacker to log in to an affected gadget utilizing the foundation account and execute arbitrary instructions
  • CVE-2024-29960 (CVSS rating: 7.5) – Using hard-coded SSH keys within the OVA picture, which may very well be exploited by an attacker to decrypt the SSH site visitors to the SANnav equipment and compromise it.
  • CVE-2024-29961 (CVSS rating: 8.2) – A vulnerability that may enable an unauthenticated, distant attacker to stage a provide chain assault by making the most of the actual fact the SANnav service sends ping instructions within the background at periodic intervals to the domains gridgain[.]com and ignite.apache[.]org to test for updates
  • CVE-2024-29963 (CVSS rating: 8.6) – Using hard-coded Docker keys in SANnav OVA to succeed in distant registries over TLS, thereby permitting an attacker to hold out adversary-in-the-middle (AitM) assault on the site visitors
  • CVE-2024-29966 (CVSS rating: 7.5) – The presence of hard-coded credentials for root customers in publicly-available documentation that would allow an unauthenticated attacker full entry to the Brocade SANnav equipment.

Following accountable disclosure twice in August 2022 and Could 2023, the failings have been addressed in SANnav model 2.3.1 launched in December 2023. Brocade’s mother or father firm Broadcom, which additionally owns Symantec and VMware, launched advisories for the failings earlier this month.

Hewlett Packard Enterprise has additionally shipped patches for a subset of those vulnerabilities in HPE SANnav Administration Portal variations 2.3.0a and a couple of.3.1 as of April 18, 2024.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.

Leave a Comment