CVE-2020-15377

9.8 CRITICAL

📋 TL;DR

CVE-2020-15377 is a Server-Side Request Forgery (SSRF) vulnerability in Brocade SANnav Webtools that allows unauthenticated attackers to make requests to arbitrary internal or external hosts. This affects Brocade SANnav installations before version 2.1.1, potentially exposing internal network resources and services to unauthorized access.

💻 Affected Systems

Products:
  • Brocade SANnav
Versions: All versions before 2.1.1
Operating Systems: Not OS-specific - runs on various platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Webtools component specifically; requires SANnav to be deployed and accessible

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot to internal systems, access sensitive data, perform internal reconnaissance, or exploit other vulnerabilities in internal services that wouldn't normally be internet-accessible.

🟠

Likely Case

Unauthenticated attackers scanning internal networks, accessing metadata services, or interacting with internal APIs to gather information about the environment.

🟢

If Mitigated

Limited to information disclosure about internal network structure and accessible services, with no direct access to sensitive data if proper network segmentation exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are commonly exploited and require minimal technical skill; the unauthenticated nature makes this particularly dangerous

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.1 and later

Vendor Advisory: https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1480

Restart Required: Yes

Instructions:

1. Download SANnav version 2.1.1 or later from Broadcom support portal. 2. Follow the SANnav upgrade procedure documented in the installation guide. 3. Verify the upgrade completed successfully and Webtools is functioning.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict network access to SANnav management interface to trusted IP addresses only

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport <sannav-port> -s <trusted-ip> -j ACCEPT
iptables -A INPUT -p tcp --dport <sannav-port> -j DROP

Reverse Proxy Filtering

all

Deploy a reverse proxy that filters SSRF attempts before they reach SANnav

Configure nginx/apache to block requests with internal IP addresses or specific patterns

🧯 If You Can't Patch

  • Isolate SANnav management interface on a dedicated VLAN with strict access controls
  • Implement network segmentation to limit what internal resources SANnav can access

🔍 How to Verify

Check if Vulnerable:

Check SANnav version via web interface or CLI; versions below 2.1.1 are vulnerable

Check Version:

From SANnav CLI: show version or check web interface administration page

Verify Fix Applied:

Confirm SANnav version is 2.1.1 or higher and test SSRF attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound connections from SANnav to internal services
  • Multiple failed authentication attempts followed by outbound requests
  • Requests to internal IP ranges (10.x, 172.16.x, 192.168.x) from SANnav

Network Indicators:

  • SANnav making requests to unexpected internal services
  • Traffic from SANnav to metadata services (169.254.169.254)
  • Outbound connections to non-standard ports from SANnav

SIEM Query:

source="sannav" AND (dest_ip=10.0.0.0/8 OR dest_ip=172.16.0.0/12 OR dest_ip=192.168.0.0/16 OR dest_ip=169.254.169.254)

🔗 References

📤 Share & Export