CVE-2020-15371

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote code injection and privilege escalation in Brocade Fabric OS. Attackers can execute arbitrary code with elevated privileges on affected switches. Organizations using Brocade Fibre Channel switches with vulnerable Fabric OS versions are affected.

💻 Affected Systems

Products:
  • Brocade Fibre Channel switches running Fabric OS
Versions: All versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3
Operating Systems: Fabric OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations of vulnerable Fabric OS versions. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Fibre Channel SAN infrastructure, allowing attackers to intercept, modify, or disrupt storage traffic, potentially leading to data theft, ransomware deployment, or service disruption.

🟠

Likely Case

Unauthorized access to storage network, privilege escalation to administrative control, and potential lateral movement to connected systems.

🟢

If Mitigated

Limited impact if network segmentation isolates SAN infrastructure and strict access controls prevent unauthorized connections.

🌐 Internet-Facing: LOW (SAN infrastructure typically not internet-facing)
🏢 Internal Only: HIGH (Critical vulnerability in internal storage infrastructure)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, or v8.2.0_CBN3

Vendor Advisory: https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1080

Restart Required: Yes

Instructions:

1. Download appropriate firmware from Broadcom support portal. 2. Backup switch configuration. 3. Apply firmware update following vendor documentation. 4. Reboot switch. 5. Verify firmware version.

🔧 Temporary Workarounds

Network segmentation

all

Isolate SAN infrastructure from general network traffic

Access control restrictions

all

Restrict management interface access to authorized IP addresses only

ipaccesscreate -n <name> -i <ip> -m <mask> -p permit
ipaccesscreate -n default -i 0.0.0.0 -m 0.0.0.0 -p deny

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAN infrastructure
  • Apply IP-based access controls to limit management interface access

🔍 How to Verify

Check if Vulnerable:

Check Fabric OS version with 'version' command and compare against patched versions

Check Version:

version

Verify Fix Applied:

Verify firmware version shows v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, or v8.2.0_CBN3 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to management interfaces
  • Unexpected configuration changes
  • Unusual process execution

Network Indicators:

  • Unexpected connections to SAN management ports
  • Anomalous traffic patterns in SAN

SIEM Query:

source="brocade_switch" AND (event_type="authentication_failure" OR event_type="configuration_change")

🔗 References

📤 Share & Export