CVE-2023-4162
📋 TL;DR
This vulnerability allows authenticated privileged users on Brocade Fabric OS switches to cause a segmentation fault (crash) by executing a specific CLI command. It affects Brocade Fabric OS versions from v9.0 up to but not including v9.2.0a. The crash could lead to denial of service on affected switches.
💻 Affected Systems
- Brocade Fabric OS
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated malicious insider with privileged access could crash critical network switches, causing widespread network outages and disrupting storage area network operations.
Likely Case
Accidental misuse by authorized administrators could cause temporary switch crashes requiring manual intervention to restore service.
If Mitigated
With proper access controls and monitoring, the impact is limited to potential service disruption from authorized users only.
🎯 Exploit Status
Exploitation requires authenticated privileged access and knowledge of the specific command syntax. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Brocade Fabric OS v9.2.0a and later
Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22513
Restart Required: Yes
Instructions:
1. Download Brocade Fabric OS v9.2.0a or later from Broadcom support portal. 2. Follow standard Fabric OS upgrade procedures. 3. Reboot the switch after upgrade completion.
🔧 Temporary Workarounds
Restrict CLI Access
allLimit access to the CLI and specifically the passwdcfg command to only essential administrators.
userconfig --add <username> -r <role>
userconfig --modify <username> -r <role>
Monitor CLI Commands
allImplement logging and monitoring for passwdcfg command usage to detect potential exploitation attempts.
logging --enable -m audit
auditcfg --set -enable
🧯 If You Can't Patch
- Implement strict role-based access control to limit who can execute CLI commands
- Monitor and alert on any usage of the passwdcfg command with --set -expire -minDiff parameters
🔍 How to Verify
Check if Vulnerable:
Check Fabric OS version: 'version' command. If version is >=9.0 and <9.2.0a, system is vulnerable.
Check Version:
version
Verify Fix Applied:
After upgrade, run 'version' command to confirm version is 9.2.0a or higher.
📡 Detection & Monitoring
Log Indicators:
- CLI audit logs showing 'passwdcfg --set -expire -minDiff' command execution
- System crash logs or segmentation fault messages
Network Indicators:
- Unexpected switch reboots or loss of connectivity to affected switches
SIEM Query:
source="brocade_switch" AND (command="passwdcfg" AND parameters="--set -expire -minDiff")
🔗 References
- https://security.netapp.com/advisory/ntap-20231124-0010/
- https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22513
- https://security.netapp.com/advisory/ntap-20231124-0010/
- https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22513