BSA-2020-906

Brocade Fabric OS

2 more products

21604

24 January 2020

24 January 2020

Closed

Medium

8.2

Yes

CVE-2019-16203

Summary

Security Advisory ID : BSA-2020-906

Component : authentication

Revision : 1.0: Final

Brocade Fabric OS Versions before v8.2.2a and v8.2.1d could expose the credentials of the remote ESRS server when these credentials are given as a command line option when configuring the ESRS client.
The arguments provided as a command line option can be captured and saved in the switch CLI History or Audit Log.
The server credentials will not be exposed to any other user of the switch and cannot be viewed by any other user account on the switch including ADMIN. However, the server credentials could be visible to a support engineer that has been given a SupportSave from the switch.

Notes
The ESRS Client is only available in Brocade Fabric OS versions above v8.2.0.
The ESRS Client is not enabled by default and must be setup before this vulnerability applies.

Affected Products

Brocade Fabric OS Versions before v8.2.2a, and v8.2.1d.

No other Brocade Fiber Channel Products from Broadcom products are currently known to be affected by this vulnerability.

Workaround:

Use the CLI in "interactive mode". When using the CLI in "interactive" mode the switch will not store any information provided.
The CLI History and Audit Log will only retain additional arguments when they are provided as a command line option.

Solution:

A security update has been provided in Brocade Fabric OS versions v8.2.2a, and v8.2.1d.  
All later versions of Brocade Fabric OS including all Brocade Fabric OS v.9.X releases also contain this same security update.
Brocade strongly recommends that all customers running the impacted version(s) upgrade to one of the identified patch levels or a higher version of Brocade Fabric OS to obtain the Security update.

Credit

Brocade is grateful to Thorsten Tüllmann for reporting this vulnerability.

Revision History

Version

Change

Date

1.0

Initial Publication

January 24, 2020