CVE-2022-33182. Privilege escalation using switch commands “supportlink”, “firmwaredownload”, “portcfgupload, license, and “fosexec”.

Brocade Fabric OS

2 more products

21236

20 September 2022

13 September 2022

Closed

Medium

Base Score: 7.8 - HIGH - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

N/A

CVE-2022-33182

Summary

Security Advisory ID : BSA-2022-2084

Component : FOS

Revision : 1.1

A privilege escalation vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, could allow a local authenticated user to escalate its privilege to root using switch commands “supportlink”, “firmwaredownload”, “portcfgupload, license, and “fosexec”.

Affected Product

All Brocade Fabric OS versions.

Products Confirmed Not Vulnerable

  • No other Brocade Fibre Channel Products from Broadcom Products are known to be affected by this vulnerability.

Solution

Security update provided in Brocade Fabric OS v9.1.1, v9.0.1e, v8.2.3c, v8.2.0_cbn5, v7.4.2j, and v9.1.0b

Credit

The issue was found during internal penetration testing

Revision History

Version

Change

Date

1.0

Initial Publication

September 13, 2022

1.1

Added FOS v9.1.0b

September 20, 2022