CVE-2024-5462
Published: 15 February 2025
Description
If Brocade Fabric OS before Fabric OS 9.2.0 configuration settings are not set to encrypt SNMP passwords, then the SNMP privsecret / authsecret fields can be exposed in plaintext. The plaintext passwords can be exposed in a configupload capture or a supportsave capture if encryption of passwords is not enabled. An attacker can use these passwords to fetch values of the supported OIDs via SNMPv3 queries. There are also a limited number of MIB objects that can be modified.
Security Summary
CVE-2024-5462 affects Brocade Fabric OS versions prior to 9.2.0. The vulnerability arises when configuration settings are not enabled to encrypt SNMP passwords, causing the SNMP privsecret and authsecret fields to be exposed in plaintext within configupload captures or supportsave captures. This issue is classified under CWE-319 (Cleartext Transmission of Sensitive Information) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact from a network-accessible attack with low complexity and no privileges required.
An attacker who obtains access to an unencrypted configupload or supportsave capture can extract the plaintext SNMP passwords. With these credentials, the attacker can perform SNMPv3 queries to retrieve values of supported OIDs and modify a limited number of MIB objects, potentially enabling unauthorized monitoring or configuration changes on the affected Fabric OS device.
The Broadcom security advisory at https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24610 provides details on mitigation. Administrators should upgrade to Fabric OS 9.2.0 or later and ensure SNMP password encryption is explicitly enabled in configuration settings to prevent plaintext exposure in captures.
Details
- CWE(s)