CVE-2023-3489

8.6 HIGH

📋 TL;DR

This vulnerability exposes FTP/SFTP/SCP server passwords in clear text within SupportSave files when downgrading from Brocade Fabric OS v9.2.0 to earlier versions. Anyone performing such downgrades on affected systems risks credential exposure. The vulnerability affects Brocade SAN switch administrators and operators.

💻 Affected Systems

Products:
  • Brocade Fabric OS
Versions: v9.2.0
Operating Systems: Fabric OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when performing downgrade operations from v9.2.0 to earlier versions. The firmwaredownload command must be used with FTP/SFTP/SCP authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to the SupportSave file and extract FTP/SFTP/SCP credentials, potentially compromising file transfer servers and enabling lateral movement to other systems.

🟠

Likely Case

Unauthorized personnel with access to SupportSave files can view sensitive credentials, leading to credential theft and potential unauthorized access to file transfer infrastructure.

🟢

If Mitigated

With proper access controls and monitoring, credential exposure is limited, but the clear text logging still represents an information disclosure risk.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to SupportSave files, which typically requires some level of system access or file retrieval capability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v9.2.1 or later

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22510

Restart Required: Yes

Instructions:

1. Download Fabric OS v9.2.1 or later from Broadcom support portal. 2. Upload firmware to switch using secure method. 3. Install firmware using 'firmwareDownload' command. 4. Reboot switch to complete installation.

🔧 Temporary Workarounds

Avoid downgrade operations

all

Do not perform downgrades from Fabric OS v9.2.0 to earlier versions. If downgrade is necessary, use alternative methods that don't involve the vulnerable firmwaredownload command.

Secure SupportSave file access

all

Restrict access to SupportSave files using file system permissions and ensure they are stored in secure locations with limited access.

🧯 If You Can't Patch

  • Monitor access to SupportSave files and alert on unauthorized access attempts.
  • Rotate FTP/SFTP/SCP credentials used with the firmwaredownload command regularly.

🔍 How to Verify

Check if Vulnerable:

Check Fabric OS version using 'version' command. If version is v9.2.0 and downgrade operations have been performed, check SupportSave files for clear text passwords.

Check Version:

version

Verify Fix Applied:

After upgrading to v9.2.1 or later, verify version with 'version' command and test that passwords are no longer logged in clear text during downgrade operations.

📡 Detection & Monitoring

Log Indicators:

  • Access to SupportSave files
  • firmwaredownload command execution with authentication parameters
  • Unauthorized file access attempts

Network Indicators:

  • Unexpected FTP/SFTP/SCP connections from switch management IPs

SIEM Query:

source="brocade_switch" AND (event="firmwaredownload" OR file_access="SupportSave")

🔗 References

📤 Share & Export