A vulnerability has been discovered in Brocade Fabric OS, which could allow an attacker to execute arbitrary commands on the targeted system. Brocade Fabric OS software is used by IBM b-type SAN directors and switches. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on a Brocade Fabric OS switch. Depending on the setup of the device, an attacker would then be capable of modifying zoning, disabling the switch, disabling ports, and modifying the switch’s IP address.
THREAT INTELLIGENCE:
There are currently no reports of this vulnerability being exploited in the wild.
SYSTEMS AFFECTED:
RISK:
Government:
Businesses:
Home users: Low
TECHNICAL SUMMARY:
A vulnerability has been discovered in Brocade Fabric OS, which could allow an attacker to execute arbitrary commands on the targeted system. Details of this vulnerability is as follows:
Tactic: Execution (TA00041):
Technique: Native Code (T1575), Command and Scripting Interpreter (T1059):
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on a Brocade Fabric OS switch. Depending on the setup of the device, an attacker would then be capable of modifying zoning, disabling the switch, disabling ports, and modifying the switch’s IP address.
RECOMMENDATIONS:
We recommend the following actions be taken:
1. Apply appropriate patches provided by Brocade Communications Systems to vulnerable systems immediately after appropriate testing. (M1051: Update Software)
2. Use capabilities to detect and block conditions that may lead to or be indicative of a software exploit occurring. (M1050: Exploit Protection)
REFERENCES:
IBM:
https://www.ibm.com/support/pages/node/6852173
Broadcom:
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2121
CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33186