Headline
CVE-2023-3489: Support Content Notification - Support Portal - Broadcom support portal
The firmwaredownload command on Brocade Fabric OS v9.2.0 could log the FTP/SFTP/SCP server password in clear text in the SupportSave file when performing a downgrade from Fabric OS v9.2.0 to any earlier version of Fabric OS.
CVE-2023-3489 - firmwaredownload command could log servers passwords in clear text
Last Updated
29 August 2023
Initial Publication Date
29 August 2023
CVSS Base Score
8.6 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Affected CVE
CVE-2023-3489
Brocade Security Advisory ID
BSA-2023-2335
Component
firmwaredownload command
Summary
The firmwaredownload command on Brocade Fabric OS v9.2.0 could log the FTP/SFTP/SCP server password in clear text in the SupportSave file when performing a downgrade from Fabric OS v9.2.0 to any earlier version of Fabric OS.
CVE Details
The firmwaredownload command downloads the Brocade Fabric OS firmware to the Brocade Switch by using FTP, SFTP, SCP, or HTTPs, or a USB device with the downloaded firmware. The firmwaredownload command supports both non-interactive and interactive modes.
In Brocade Fabric OS v9.2.0, the command exposes the server password in clear text in theSupportSave file when it is collected. The issue is fixed in Brocade Fabric OS v9.2.0a, therefore a migration to/from Brocade Fabric OS v9.2.0a and later versions will not log passwords or sensitive data when the command is executed through the CLI, REST API or the web interface non-interactively.
Products Affected
Brocade Fabric OS v9.2.0.
Note for Brocade Fabric OS v9.1.1x downgrades
Should the Brocade Switch be downgraded from v9.2.0 to v9.1.1x or any earlier version of FOS, using the CLI in non-interactive mode ie the whole command line, the password could be exposed in SupportSave file.
Products Confrimed Not Affected
Brocade Fabric OS versions prior to v9.2.0 are not affected.
Workaround
The workaround is to use the web interface of REST API or to run the “firmwaredownload “ command in interactive mode.
Solution
Solution provided in Brocade Fabric OS v9.2.0a and later versions.
Credit
The issue was found during internal penetration testing
Revision History
Version
Change
Date
1.0
Initial Publication
August 29, 2023
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE’S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.