CVE-2021-42773
📋 TL;DR
This vulnerability in Broadcom Emulex HBA Manager allows unauthenticated remote users to retrieve arbitrary files from affected systems when not configured in Strictly Local Management mode. It affects versions before 11.4.425.0 and 12.8.542.31, potentially exposing sensitive system files to attackers.
💻 Affected Systems
- Broadcom Emulex HBA Manager
- Broadcom Emulex One Command Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through retrieval of sensitive files like configuration files, passwords, or system logs, leading to lateral movement or data exfiltration.
Likely Case
Unauthorized access to sensitive system files containing configuration data, potentially enabling further attacks or information disclosure.
If Mitigated
Limited impact with proper network segmentation and access controls preventing unauthorized connections to management interfaces.
🎯 Exploit Status
Exploitation requires sending GetDumpFile command to vulnerable systems. No authentication needed in non-secure mode.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 11.4.425.0 and 12.8.542.31 or later
Vendor Advisory: https://docs.broadcom.com/doc/elx_HBAManager-Lin-RN12811-101.pdf
Restart Required: Yes
Instructions:
1. Download updated version from Broadcom support portal. 2. Backup current configuration. 3. Install updated version following vendor instructions. 4. Restart affected services or system.
🔧 Temporary Workarounds
Enable Strictly Local Management Mode
allConfigure HBA Manager to only accept connections from localhost, preventing remote exploitation.
Refer to Broadcom documentation for specific configuration steps
Network Segmentation
linuxRestrict network access to HBA Manager ports using firewall rules.
iptables -A INPUT -p tcp --dport [HBA_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [HBA_PORT] -j DROP
🧯 If You Can't Patch
- Enable Strictly Local Management mode immediately
- Implement strict network access controls and firewall rules to limit connections to trusted IPs only
🔍 How to Verify
Check if Vulnerable:
Check HBA Manager version and configuration mode. If version is below patched versions and not in Strictly Local Management mode, system is vulnerable.
Check Version:
emlxhba -v or check HBA Manager GUI/CLI version information
Verify Fix Applied:
Verify version is 11.4.425.0 or higher (for 11.x) or 12.8.542.31 or higher (for 12.x). Confirm Strictly Local Management mode is enabled.
📡 Detection & Monitoring
Log Indicators:
- Unusual GetDumpFile command requests
- Unauthorized access attempts to HBA Manager
- File retrieval operations from unexpected sources
Network Indicators:
- Unexpected connections to HBA Manager ports (typically 2301, 2302)
- GetDumpFile commands in network traffic
SIEM Query:
source="HBA_Manager_Logs" AND (event="GetDumpFile" OR event="unauthorized_access")
🔗 References
- https://docs.broadcom.com/doc/elx_HBAManager-Lin-RN12811-101.pdf
- https://www.broadcom.com/products/storage/fibre-channel-host-bus-adapters/emulex-hba-manager
- https://docs.broadcom.com/doc/elx_HBAManager-Lin-RN12811-101.pdf
- https://www.broadcom.com/products/storage/fibre-channel-host-bus-adapters/emulex-hba-manager