Description

Security researcher Pierre Barre has identified multiple vulnerabilities in the Brocade SANnav storage area network (SAN) management application, warning that these flaws could compromise both the appliance and Fibre Channel switches. Barre discovered a total of 18 vulnerabilities in the appliance, nine of which have been assigned CVE identifiers, including CVE-2024-2859 and CVE-2024-29960 through CVE-2024-29967. The vulnerabilities include unauthenticated flaws that allow remote attackers to log in to vulnerable devices as root. Three of these vulnerabilities could enable attackers to send malicious data and intercept credentials sent in clear text, potentially compromising the entire Fibre Channel infrastructure. One of the critical issues arises because the SANnav VM lacks a firewall by default, allowing attackers to access APIs for the Apache Kafka event streaming platform. Additionally, vulnerabilities stem from using HTTP as the management protocol when HTTPS is blocked and sending syslog traffic in clear text. Barre also discovered two backdoor user accounts, 'root' and 'sannav', with publicly known passwords. Furthermore, he found that SANnav's Postgres instance runs without authentication, allowing unauthenticated attackers to gain read and write access to the database, potentially compromising sensitive information. SANnav uses 40 Docker instances, some of which have extensive permissions, allowing attackers to take control of the appliance. Barre reported these flaws to Brocade in 2022, but his initial report was rejected. However, Brocade acknowledged the issues after Barre confirmed they persisted in SANnav version 2.2.2. The vulnerabilities were patched in SANnav version 2.3.1, released in December 2023.