CVE-2024-29959

8.6 HIGH

📋 TL;DR

This vulnerability in Brocade SANnav management software exposes encrypted switch passwords in support save files from standby nodes. Attackers with access to these files could potentially decrypt passwords, compromising SAN switch credentials. Organizations using Brocade SANnav before v2.3.1 or v2.3.0a are affected.

💻 Affected Systems

Products:
  • Brocade SANnav
Versions: All versions before v2.3.1 and v2.3.0a
Operating Systems: Not OS-specific - SANnav appliance/software
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects Brocade SANnav Standby nodes when generating support save files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain encrypted passwords, decrypt them, gain administrative access to SAN switches, and potentially disrupt or compromise entire storage networks.

🟠

Likely Case

Insiders or attackers with access to support files extract encrypted passwords, potentially leading to credential theft and unauthorized SAN access.

🟢

If Mitigated

With proper access controls, the impact is limited as support files are protected, but credential exposure risk remains if files are accessed.

🌐 Internet-Facing: LOW - SANnav management interfaces are typically internal, not directly internet-facing.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can access support files containing sensitive credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires access to support save files but no complex exploitation steps.

Exploitation requires access to support save files, typically through compromised accounts or insider access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.3.1 or v2.3.0a

Vendor Advisory: https://support.broadcom.com/external/content/SecurityAdvisories/0/23243

Restart Required: Yes

Instructions:

1. Download Brocade SANnav v2.3.1 or v2.3.0a from Broadcom support. 2. Backup current configuration. 3. Apply update following vendor documentation. 4. Restart SANnav services. 5. Verify version update.

🔧 Temporary Workarounds

Restrict Support Save File Access

linux

Limit access to support save files and directories containing them to prevent unauthorized viewing.

chmod 600 /path/to/support/save/files/*
chown root:root /path/to/support/save/files/*

Disable Automatic Support Save

all

Configure SANnav to not automatically generate or retain support save files containing sensitive data.

Consult SANnav documentation for support save configuration settings

🧯 If You Can't Patch

  • Implement strict access controls on SANnav systems and support save directories
  • Monitor and audit access to support save files and SANnav administrative interfaces

🔍 How to Verify

Check if Vulnerable:

Check SANnav version via web interface or CLI. Versions before v2.3.1 and v2.3.0a are vulnerable.

Check Version:

sannav --version or check web interface administration panel

Verify Fix Applied:

Confirm SANnav version is v2.3.1 or v2.3.0a. Test that support save files no longer contain encrypted passwords.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to support save files
  • Multiple support save generation attempts
  • Access to SANnav administrative interfaces from unusual sources

Network Indicators:

  • Unusual SANnav management traffic patterns
  • Unexpected connections to SANnav ports

SIEM Query:

source="sannav" AND (event="support_save" OR event="file_access") AND user!="authorized_user"

🔗 References

📤 Share & Export