CVE-2020-15373

9.8 CRITICAL

📋 TL;DR

Multiple buffer overflow vulnerabilities in the REST API of Brocade Fabric OS allow remote unauthenticated attackers to execute arbitrary code or cause denial of service. This affects Brocade SAN switches running vulnerable Fabric OS versions. Attackers can exploit these vulnerabilities without authentication.

💻 Affected Systems

Products:
  • Brocade SAN switches with Fabric OS
Versions: v8.2.1 through v8.2.1d, and v8.2.2 versions before v8.2.2c
Operating Systems: Fabric OS
Default Config Vulnerable: ⚠️ Yes
Notes: REST API is typically enabled by default in affected versions. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the SAN environment.

🟠

Likely Case

Denial of service attacks disrupting SAN operations, potentially leading to business-critical storage outages.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to REST API endpoints.

🌐 Internet-Facing: HIGH - CVSS 9.8 indicates critical severity with remote unauthenticated exploitation possible.
🏢 Internal Only: HIGH - Even internally, unauthenticated attackers on the network can exploit these vulnerabilities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Buffer overflow vulnerabilities in network services are commonly weaponized. The unauthenticated nature makes exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v8.2.2c and later for 8.2.2 branch; v8.2.1e and later for 8.2.1 branch

Vendor Advisory: https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1082

Restart Required: Yes

Instructions:

1. Download appropriate firmware from Broadcom support portal. 2. Backup current configuration. 3. Apply firmware update following vendor documentation. 4. Reboot switch to activate new firmware. 5. Verify version after reboot.

🔧 Temporary Workarounds

Disable REST API

all

Disable the vulnerable REST API service if not required for operations

firmwaredefaults --restapi disable
reboot

Restrict Network Access

all

Implement strict network access controls to limit access to REST API endpoints

Use firewall rules to restrict access to switch management IP on port 80/443

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAN switches from untrusted networks
  • Disable REST API service entirely if not required for operations

🔍 How to Verify

Check if Vulnerable:

Check Fabric OS version with 'version' command. If version is between v8.2.1-v8.2.1d or v8.2.2 before v8.2.2c, system is vulnerable.

Check Version:

version

Verify Fix Applied:

After patching, verify version is v8.2.2c or later (for 8.2.2 branch) or v8.2.1e or later (for 8.2.1 branch)

📡 Detection & Monitoring

Log Indicators:

  • Unusual REST API access patterns
  • Multiple failed buffer overflow attempts in system logs
  • Unexpected process crashes or restarts

Network Indicators:

  • Unusual traffic to switch REST API endpoints (typically port 80/443)
  • Malformed HTTP requests to /rest/ endpoints

SIEM Query:

source="brocade_switch" AND (http_request LIKE "%rest%" AND (status_code=500 OR bytes_received>threshold))

🔗 References

📤 Share & Export