BSA-2018-731

Brocade Security Advisory ID

BSA-2018-731

Initial Publication Date

10/29/2018

Last Updated

10/29/2018

Revision

1.0: Initial

Risk Impact

High

Workaround

N/A

Component

Fabric OS CLI

Affected CVE

CVE-2018-6437, CVE-2018-6438

CVSS Score

7.8

Summary
Multiple Vulnerabilities in Brocade Fabric OS command line interface (CLI) could allow a local attacker to escape the restricted shell and, gain root access.

Commands Affected

  • help command - CVE-2018-6437 - CVSS 3: 7.8
  • supportsave command - CVE-2018-6438 - CVSS 3: 7.8

Affected Products
Brocade Fabric OS versions before 8.2.1, 8.1.2f, 8.0.2f, 7.4.2d.

Products Confirmed Not Vulnerable
No other Brocade Fibre Channel technology products from Broadcom are currently known to be affected by this vulnerability.

Solution
Security updates for the issues described in this advisory are provided in Brocade Fabric OS (FOS) v8.2.1, v8.1.2f, v8.0.2f, v7.4.2d and later releases. The patch releases have been posted to the MyBrocade web portal.

Recommended Action
Brocade  recommends that all customers running the impacted version(s) install the patch(es).

Credit
The vulnerabilities have been found through Penetration Testing. 

Revision History

Version Change Date
1.0 Initial Publication October 29, 2018

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.