CVE-2024-29957

7.5 HIGH

📋 TL;DR

Brocade SANnav servers configured in Disaster Recovery mode store encryption keys in DR log files, creating an additional attack surface. Attackers who gain access to these log files could obtain encryption keys, potentially compromising encrypted data. This affects Brocade SANnav servers before version 2.3.1 and 2.3.0a.

💻 Affected Systems

Products:
  • Brocade SANnav
Versions: All versions before 2.3.1 and 2.3.0a
Operating Systems: Not OS-specific - Brocade SANnav appliance
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured in Disaster Recovery mode. Standard mode configurations are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain encryption keys from DR log files and decrypt sensitive SAN management data, leading to data exposure, unauthorized access to storage infrastructure, or manipulation of SAN configurations.

🟠

Likely Case

Attackers with existing access to the system extract encryption keys from log files, potentially escalating privileges or accessing encrypted configuration data.

🟢

If Mitigated

With proper access controls and log file protection, attackers cannot reach the DR log files, preventing key extraction even if the vulnerability exists.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to DR log files, which typically means some level of system access is already achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.1 or 2.3.0a

Vendor Advisory: https://support.broadcom.com/external/content/SecurityAdvisories/0/23241

Restart Required: Yes

Instructions:

1. Download Brocade SANnav version 2.3.1 or 2.3.0a from Broadcom support portal. 2. Backup current configuration. 3. Apply the update following Brocade SANnav upgrade procedures. 4. Restart the SANnav services or appliance as required.

🔧 Temporary Workarounds

Disable Disaster Recovery Mode

all

If Disaster Recovery functionality is not required, disable DR mode to eliminate the vulnerability.

Consult Brocade SANnav documentation for DR mode disable procedures

Restrict Access to DR Log Files

linux

Apply strict file permissions to DR log directories to prevent unauthorized access.

chmod 600 /path/to/dr/logs/*
chown root:root /path/to/dr/logs/*

🧯 If You Can't Patch

  • Implement strict access controls on DR log directories and files
  • Monitor access to DR log files and alert on unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check SANnav version via web interface or CLI. If version is below 2.3.1 and not 2.3.0a, and DR mode is enabled, system is vulnerable.

Check Version:

sannav-cli version or check web interface System > About

Verify Fix Applied:

Verify SANnav version is 2.3.1 or 2.3.0a via admin interface. Confirm DR log files no longer contain encryption keys.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to DR log directories
  • File read operations on DR log files by non-privileged users

Network Indicators:

  • Unusual data exfiltration patterns from SANnav appliance

SIEM Query:

source="sannav" AND (event="file_access" AND path="*dr*log*") OR (user!="root" AND process="cat|less|more|tail" AND file="*dr*log*")

🔗 References

📤 Share & Export