A major vulnerability under the identifier CVE-2024-29954 has been discovered in the password management Application Programming Interface (API) of Brocade Fabric OS software. The affected versions are those released before v9.2.1, v9.2.b, v9.1.1d, and v8.2.3e. This vulnerability allows authenticated users to view server passwords for protocols such as SCP (Secure Copy) and SFTP (SSH File Transfer Protocol) by inspecting the log files generated during the firmware download process.

Exploit Details

When an authenticated user enters the firmwaredownload command incorrectly or points to an erroneous file, the firmware download log captures the failed attempt and records the complete command, which includes any password entered on the command line.

This sensitive information is then saved in the log file, accessible to authorized users within the system. Subsequently, an attacker with valid access to the system can locate and exploit these exposed credentials, potentially gaining unauthorized access to additional resources and causing significant damage.

Code Snippet

The following example replicates the vulnerability in which the firmwaredownload command captures a user's password in the log file:

$ firmwaredownload server_ip:file_path/file_name <-- Incorrect command/file path
Please enter password:
$ user_password <-- Sensitive information exposed

--- Firmware Download Log ---

// Below is an example entry in a log file

[2024-09-01 10:20:30] Firmware download failed: "firmwaredownload server_ip:file_path/file_name user_password"

In this code snippet, the user enters the firmwaredownload command followed by an incorrect path or faulty file. The command then prompts the user to enter the password. The entire command and password are logged and saved within the firmware download log file.

References

For more information on this vulnerability, including further details and explanations, please consult the following authoritative sources:

1. CVE-2024-29954 Entry on the National Vulnerability Database – includes additional references to vendor advisories and third-party resources.
2. Brocade Fabric OS Release Notes – Brocade Fabric OS official documentation provides insights into new features, resolved issues, and known issues for each release of Fabric OS. Check for information about the corrected vulnerability in updates v9.2.1, v9.2.b, v9.1.1d, and v8.2.3e.

Mitigation Steps

To mitigate this vulnerability, users should update their Brocade Fabric OS software to the latest versions such as v9.2.1, v9.2.b, v9.1.1d, or v8.2.3e. These versions have addressed the vulnerability by ensuring that sensitive information (passwords) used in the firmwaredownload command is not saved in the log files. It is important to set up regular software updates and maintain a security-conscious approach to prevent any potential future vulnerabilities from causing harm.

Timeline

Published on: 06/26/2024 00:15:10 UTC
Last modified on: 08/02/2024 01:17:58 UTC