CVE-2022-33186 : EZServer module vulnerability. (BSA-2022-2121)

Brocade Fabric OS

2 more products

21217

25 April 2024

08 November 2022

CLOSED

CRITICAL

9.4 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

Yes

CVE-2022-33186

Summary

Security Advisory ID: BSA-2022-2121

Component: EZServer

Revision: 2.1

A vulnerability in Brocade Fabric OS software v9.1.1, v9.0.1e, v8.2.3c, v7.4.2j, and earlier versions could allow a remote unauthenticated attacker to execute on a Brocade Fabric OS switch commands capable of modifying zoning, disabling the switch, disabling ports, and modifying the switch IP address.

The vulnerability is due to the Brocade EZswitch software server embedded in the Brocade Fabric OS.

Brocade EZswitch is an external tool that enables SAN administrators to configure and manage single-switch fabrics from a standard workstation using a simple graphical user interface (GUI) wizard.

This tool is used only at initial switch configuration and is not required during normal operation once new factory switches have been configured.

Products Affected

Brocade Fabric OS versions v9.1.1, v9.0.1e, v8.2.3c, v7.4.2j, and earlier versions are affected.

Products Confirmed Not Affected

No other Brocade Fibre Channel products are affected.

Solution

Broadcom recommends that customers immediately apply one of the remediation steps below to disable the EZServer and block all commands through this interface.   

To further remediate the issue, the Brocade EZServer module is completely removed from all future Brocade FOS releases, effectively ending support for EZSwitch.

Brocade has also removed EZSwitch from its download center to limit any further distribution of this tool.

Remediation

To remove any exposure to this vulnerability, Brocade Fabric OS (FOS) switch administrators must disable EZServer support or upgrade to a version of Brocade Fabric OS that has the EZServer module removed

Disabling EZServer is accomplished through the use of the CLI command configurechassis.  Disabling the EZServer in the switch configuration will prevent any exposure to this vulnerability.   This option is only available on Brocade Fabric OS versions v8.1.0b and higher.  Customers running on older versions of Brocade Fabric OS, including v7.4.2j, do not have this option and must upgrade to Brocade Fabric OS v7.4.2j1 to protect their switches.

Customers that elect to upgrade their Brocade Fabric OS version can obtain a patch with the EZServer module removed:

  • Brocade Fabric OS v9.1.1_01 and higher versions
  • Brocade Fabric OS v9.0.1e1 and higher versions
  • Brocade Fabric OS v8.2.3c1 and higher versions
  • Brocade Fabric OS v7.4.2j1 and higher versions

These patches can be obtained from their standard support customer portal or by contacting their support organization.   

Example showing how to disable the EZServer module:

brocadeswitch:admin> configurechassis

Configure...

cfgload attributes (yes, y, no, n): [no]

ssl attributes (yes, y, no, n): [no]

webtools attributes (yes, y, no, n): [no] y

...

Login Session Timeout (in secs): (60..432000) [7200]

EZserver Enabled (yes, y, no, n): [yes] no

...

brocadeswitch:admin >

Notes:

The following actions will re-enable EZServer on Brocade Fabric OS versions that do not have the EZServer module entirely removed

o firmwarecleaninstall

o config removall

o configdefault

o factory reset

Credit.

  • This issue was found internally.
  • Pierre Barre also reported the issue after it was already addressed by Brocade

Revision History

Version Change Date
1.0 Initial Publication Nov 8, 2022
2.0 update related to 7.4.2.x versions Nov 8, 2022
2.1 Added credit to Pierre Barre April 24, 2024