CVE-2024-10404

5.5 MEDIUM

📋 TL;DR

Brocade SANnav versions before 2.3.1b log sensitive information like passwords and SNMP secrets in clear text. This allows authenticated local attackers with administrative privileges to retrieve sensitive data from support files. The vulnerability affects Brocade SANnav management software users.

💻 Affected Systems

Products:
  • Brocade SANnav
Versions: All versions before 2.3.1b
Operating Systems: Not specified - Brocade SANnav appliance/software
Default Config Vulnerable: ⚠️ Yes
Notes: This is an incomplete fix for CVE-2024-29952. Requires authenticated local access with administrative privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials and SNMP secrets, enabling complete SAN infrastructure compromise, lateral movement, and data exfiltration.

🟠

Likely Case

Privileged insiders or attackers with local access extract credentials from support files, leading to unauthorized access to Brocade switches.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to credential exposure requiring additional steps for exploitation.

🌐 Internet-Facing: LOW - Requires local access to the SANnav system, not directly exploitable over internet.
🏢 Internal Only: HIGH - Local attackers with administrative privileges can extract sensitive credentials from support files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simply accessing support files containing clear text logs.

Exploitation requires administrative privileges and access to 'supportsave' files or the system where they're stored.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.1b

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25403

Restart Required: Yes

Instructions:

1. Download Brocade SANnav 2.3.1b from Broadcom support portal. 2. Backup current configuration. 3. Apply the update following Brocade SANnav upgrade procedures. 4. Restart the SANnav service/system.

🔧 Temporary Workarounds

Restrict access to support files

linux

Limit access to 'supportsave' files and directories containing support data to authorized administrators only.

chmod 600 /path/to/supportsave/files
chown root:root /path/to/supportsave/files

Disable unnecessary logging

all

Review and disable logging of sensitive information in CalInvocationHandler if possible.

Review Brocade SANnav logging configuration and disable sensitive data logging

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access SANnav systems and support files.
  • Monitor and audit access to support files and SANnav administrative interfaces for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check SANnav version via web interface or CLI. If version is below 2.3.1b, system is vulnerable.

Check Version:

Check SANnav web interface or use 'sannav-version' command if available via CLI.

Verify Fix Applied:

Verify SANnav version is 2.3.1b or higher. Check that sensitive data is no longer logged in clear text in support files.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to support files
  • Multiple access attempts to 'supportsave' directories
  • Administrative credential misuse following support file access

Network Indicators:

  • Unusual SNMP traffic from SANnav systems
  • Unexpected administrative access to Brocade switches

SIEM Query:

source="sannav" AND (event="file_access" AND file_path="*supportsave*") OR (event="auth_failure" AND user="admin")

🔗 References

📤 Share & Export