BSA-2017-208
21354
17 November 2017
02 May 2017
Closed
High
8.0
Yes
CVE-2016-8202
Summary
Security Advisory ID : BSA-2017-208
Component : FOS
Revision : 2.0: Interim
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated, attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected versions, non-root users can gain root access with a combination of shell commands and parameters.
Affected Products
Product | Current Assessment |
---|---|
Brocade Fabric OS | Impacted: All Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b. |
Products Confirmed Not Vulnerable
No other Brocade products are currently known to be affected by this vulnerability.
Solution
Brocade has fixed the vulnerability described in this advisory in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) FOS v7.4.1d and later, Brocade FOS v8.0.1b and later releases. The patch releases have been posted to the MyBrocade web portal.
Workaround
Minimizing exposure to this vulnerability can be done by the following means:
- Tightly control list of operators and administrators accessing the switch via CLI and other management interfaces;
- Using firewall and ipfilter to limit access to switch CLI interface from trusted hosts only.
- If you have not done so in the past, change all Brocade default account passwords, including the root passwords, from the default factory passwords.
- Delete guest accounts and temporary accounts created for one-time usage needs.
- Utilize FOS password policy management to strengthen the complexity, age, and history requirements of switch account passwords.
Recommended Action
Brocade strongly recommends that all customers running the impacted version(s) install the patch.
Credit
This vulnerability was found during internal security testing.
Revision History
Version | Change | Date |
---|---|---|
1.0 | Initial Publication | May 1, 2017 |