CVE-2022-28163

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Brocade SANnav allows attackers to execute arbitrary SQL commands through multiple Zone management endpoints. It affects Brocade SANnav installations before version 2.2.0, potentially compromising the entire SAN management system.

💻 Affected Systems

Products:
  • Brocade SANnav
Versions: All versions before 2.2.0
Operating Systems: Not OS-specific - runs as appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with Zone management functionality enabled

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SAN management system leading to data exfiltration, service disruption, or lateral movement to connected storage systems

🟠

Likely Case

Unauthorized access to sensitive SAN configuration data, potential privilege escalation within SANnav

🟢

If Mitigated

Limited impact if network segmentation prevents access to SANnav management interfaces

🌐 Internet-Facing: HIGH if SANnav management interface is exposed to internet
🏢 Internal Only: HIGH as attackers with internal network access can exploit this vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity, but authentication may be required

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.0 or later

Vendor Advisory: https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1842

Restart Required: Yes

Instructions:

1. Download SANnav 2.2.0 or later from Broadcom support portal. 2. Backup current configuration. 3. Apply the update following vendor documentation. 4. Restart SANnav services.

🔧 Temporary Workarounds

Network segmentation

all

Restrict access to SANnav management interfaces to authorized administrators only

Input validation at WAF

all

Implement SQL injection protection rules in web application firewall

🧯 If You Can't Patch

  • Implement strict network access controls to SANnav management interface
  • Monitor for unusual SQL queries or unauthorized access attempts to Zone management endpoints

🔍 How to Verify

Check if Vulnerable:

Check SANnav version via web interface or CLI. If version is below 2.2.0, system is vulnerable.

Check Version:

Check via SANnav web interface: System > About, or via CLI if available

Verify Fix Applied:

Confirm SANnav version is 2.2.0 or higher and test Zone management functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts followed by successful access to Zone endpoints
  • Unexpected database schema changes

Network Indicators:

  • Unusual traffic patterns to Zone management API endpoints
  • SQL error messages in HTTP responses

SIEM Query:

source="sannav" AND (uri="*zone*" OR uri="*Zone*") AND (status=500 OR response_size>10000)

🔗 References

📤 Share & Export