Extreme Flaws Disclosed in Brocade SANnav SAN Administration Software program

Apr 26, 2024NewsroomProvide Chain Assault / Software program Safety

A number of safety vulnerabilities disclosed in Brocade SANnav storage space community (SAN) administration utility might be exploited to compromise prone home equipment.

The 18 flaws impression all variations as much as and together with 2.3.0, in accordance with impartial safety researcher Pierre Barre, who found and reported them.

The problems vary from incorrect firewall guidelines, insecure root entry, and Docker misconfigurations to lack of authentication and encryption, thus permitting an attacker to intercept credentials, overwrite arbitrary information, and utterly breach the machine.

Cybersecurity

A few of the most extreme flaws are listed beneath –

  • CVE-2024-2859 (CVSS rating: 8.8) – A vulnerability that would enable an unauthenticated, distant attacker to log in to an affected machine utilizing the basis account and execute arbitrary instructions
  • CVE-2024-29960 (CVSS rating: 7.5) – The usage of hard-coded SSH keys within the OVA picture, which might be exploited by an attacker to decrypt the SSH site visitors to the SANnav equipment and compromise it.
  • CVE-2024-29961 (CVSS rating: 8.2) – A vulnerability that may enable an unauthenticated, distant attacker to stage a provide chain assault by benefiting from the actual fact the SANnav service sends ping instructions within the background at periodic intervals to the domains gridgain[.]com and ignite.apache[.]org to examine for updates
  • CVE-2024-29963 (CVSS rating: 8.6) – The usage of hard-coded Docker keys in SANnav OVA to achieve distant registries over TLS, thereby permitting an attacker to hold out adversary-in-the-middle (AitM) assault on the site visitors
  • CVE-2024-29966 (CVSS rating: 7.5) – The presence of hard-coded credentials for root customers in publicly-available documentation that would allow an unauthenticated attacker full entry to the Brocade SANnav equipment.

Following accountable disclosure twice in August 2022 and Could 2023, the issues have been addressed in SANnav model 2.3.1 launched in December 2023. Brocade’s guardian firm Broadcom, which additionally owns Symantec and VMware, launched advisories for the issues earlier this month.

Hewlett Packard Enterprise has additionally shipped patches for a subset of those vulnerabilities in HPE SANnav Administration Portal variations 2.3.0a and a couple of.3.1 as of April 18, 2024.

SANnav SAN Management Software

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.

Recent articles

Patch Alert: Essential Apache Struts Flaw Discovered, Exploitation Makes an attempt Detected

Dec 18, 2024Ravie LakshmananCyber Assault / Vulnerability Risk actors are...

Meta Fined €251 Million for 2018 Knowledge Breach Impacting 29 Million Accounts

Dec 18, 2024Ravie LakshmananKnowledge Breach / Privateness Meta Platforms, the...