Brocade SANnav: Attackers can obtain access data through security leaks

Broadcom warns of security vulnerabilities in Brocade SANnav through which attackers can gain unauthorized access. Updated software closes them.

listen Print view
Burning NAS systems

(Image: Bild erstellt mit KI in Bing Image Creator durch heise online / dmk)

2 min. read

There are security gaps in Broadcom's Brocade SANnav that could allow attackers to gain unauthorized access data or carry out various attacks. Updated software packages are intended to rectify the vulnerabilities.

Broadcom has now warned of a total of five security vulnerabilities in the storage area network management software. The developers consider the most serious to be a loophole through which Brocade SANnav saves the encryption keys in a Brocade SANnav support save in the event of certain errors during installation or an upgrade. Attackers with elevated privileges to access the Brocade database can use this encryption key to gain access to passwords used by SANnav.

The Docker daemon in Brocade SANnav runs without auditing. This allows registered attackers from the network to carry out various attacks. The reason for this is that docker operations are carried out with elevated rights and with unrestricted access in the host system.

Videos by heise

Furthermore, the encryption for SSH on port 22 is insecure: Brocade SANnav activates outdated SHA1 settings for remote access. This makes the encryption vulnerable to collision attacks.

The security messages in detail:

The vulnerabilities correct versions 2.4.0 and 2.3.1b of Brocade SANnav. IT managers should install them quickly due to the severity of some of the vulnerabilities.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.