CVE-2024-29953

4.3 MEDIUM

📋 TL;DR

This vulnerability in Brocade Fabric OS web interface exposes encoded session passwords in session storage on Virtual Fabric platforms. It allows authenticated users to view other users' session passwords, potentially enabling privilege escalation. Affected are Brocade SAN switches running vulnerable Fabric OS versions.

💻 Affected Systems

Products:
  • Brocade SAN switches with Fabric OS
Versions: Fabric OS versions before v9.2.1, v9.2.0b, and v9.1.1d
Operating Systems: Fabric OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Virtual Fabric platforms. Requires authenticated access to web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious user could decode exposed session passwords, impersonate administrators, gain full control of SAN fabric, and potentially access sensitive storage data.

🟠

Likely Case

Authenticated users with limited privileges could view encoded passwords of other sessions, potentially enabling lateral movement within the fabric management environment.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authenticated users who already have some level of access to the management interface.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to web interface. Password encoding may require additional decoding steps.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v9.2.1, v9.2.0b, or v9.1.1d

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23227

Restart Required: Yes

Instructions:

1. Download appropriate firmware version from Broadcom support portal. 2. Backup current configuration. 3. Upload and install firmware via CLI or web interface. 4. Reboot switch after installation completes.

🔧 Temporary Workarounds

Disable web interface

all

Disable the vulnerable web interface and use CLI-only management

firmwareDefault
ipAddrSet -disable

Restrict web interface access

all

Limit web interface access to trusted management networks only

ipfilter -a -i <interface> -s <trusted_network> -p tcp -d 80,443 -A

🧯 If You Can't Patch

  • Implement strict access controls to limit web interface access to authorized administrators only
  • Enable detailed logging and monitoring of web interface access and session activities

🔍 How to Verify

Check if Vulnerable:

Check Fabric OS version with 'version' command. If version is earlier than v9.2.1, v9.2.0b, or v9.1.1d, system is vulnerable.

Check Version:

version

Verify Fix Applied:

After patching, verify version shows v9.2.1, v9.2.0b, or v9.1.1d or later with 'version' command.

📡 Detection & Monitoring

Log Indicators:

  • Multiple session accesses from single user
  • Unusual session creation patterns
  • Access to session storage locations

Network Indicators:

  • Multiple HTTP requests to session storage endpoints from single IP
  • Unusual traffic patterns to web interface

SIEM Query:

source="brocade_switch" AND (event_type="session_access" OR url="*/session*") | stats count by src_ip, user

🔗 References

📤 Share & Export