CVE-2022-28169: Privilege escalation in Brocade Fabric OS
Brocade Webtools in Brocade Fabric OS versions before Brocade Fabric OS versions v9.1.1, v9.0.1e, and v8.2.3c could allow a low privilege webtools, user, to gain elevated admin rights, or privileges, beyond what is intended or entitled for that user. By exploiting this vulnerability, a user whose role is not an admin can create a new user with an admin role using the operator session id. The issue was replicated after intercepting the admin, and operator authorization headers sent unencrypted and editing a user addition request to use the operator's authorization header.
AI Analysis
Technical Summary
CVE-2022-28169 is a high-severity privilege escalation vulnerability affecting Brocade Fabric OS versions prior to v9.1.1, v9.0.1e, and v8.2.3c. The vulnerability resides in the Brocade Webtools component, which is used for managing Brocade Fibre Channel switches. Specifically, a low-privileged Webtools user can exploit this flaw to gain administrative privileges beyond their intended access level. The root cause is the transmission of admin and operator authorization headers in an unencrypted form. An attacker with low privileges can intercept these authorization headers, particularly the operator session ID, and manipulate user addition requests by substituting the operator's authorization header. This allows the attacker to create a new user account with admin-level privileges without proper authorization. The vulnerability is classified under CWE-269 (Improper Privilege Management) and has a CVSS v3.1 base score of 8.8, indicating high severity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and only requires low privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the affected system. No known exploits in the wild have been reported yet. This vulnerability poses a significant risk to the security of storage area networks (SANs) managed by Brocade Fabric OS, potentially allowing unauthorized administrative control over critical network infrastructure components.
Potential Impact
For European organizations, this vulnerability could have severe consequences, especially for enterprises relying on Brocade Fibre Channel switches for their SAN infrastructure. Unauthorized administrative access could lead to unauthorized configuration changes, data interception, or disruption of storage network availability. This could impact critical business operations, data integrity, and confidentiality, particularly in sectors such as finance, healthcare, telecommunications, and government where data security and availability are paramount. The ability to create admin users covertly increases the risk of persistent threats and insider-like attacks. Additionally, compromised SAN infrastructure could facilitate lateral movement within the network, escalating the scope of potential damage. Given the high impact on confidentiality, integrity, and availability, exploitation could result in significant operational downtime, data breaches, and regulatory compliance violations under GDPR and other European data protection laws.
Mitigation Recommendations
European organizations should prioritize upgrading Brocade Fabric OS to versions v9.1.1, v9.0.1e, or v8.2.3c or later, where this vulnerability is patched. Until patching is possible, organizations should implement network-level protections such as isolating management interfaces of Brocade switches to trusted networks only, employing VPNs or encrypted tunnels (e.g., IPsec) to secure management traffic, and enforcing strict access controls and monitoring on Webtools usage. Additionally, organizations should audit existing user accounts for unauthorized admin users and review logs for suspicious activities related to user creation or privilege escalation. Implementing multi-factor authentication (MFA) for administrative access, if supported, can further reduce risk. Network intrusion detection systems (NIDS) should be configured to detect anomalous Webtools traffic patterns or unauthorized header manipulations. Finally, educating administrators about the risks of unencrypted management traffic and enforcing encryption best practices can mitigate exploitation vectors.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2022-28169: Privilege escalation in Brocade Fabric OS
Description
Brocade Webtools in Brocade Fabric OS versions before Brocade Fabric OS versions v9.1.1, v9.0.1e, and v8.2.3c could allow a low privilege webtools, user, to gain elevated admin rights, or privileges, beyond what is intended or entitled for that user. By exploiting this vulnerability, a user whose role is not an admin can create a new user with an admin role using the operator session id. The issue was replicated after intercepting the admin, and operator authorization headers sent unencrypted and editing a user addition request to use the operator's authorization header.
AI-Powered Analysis
Technical Analysis
CVE-2022-28169 is a high-severity privilege escalation vulnerability affecting Brocade Fabric OS versions prior to v9.1.1, v9.0.1e, and v8.2.3c. The vulnerability resides in the Brocade Webtools component, which is used for managing Brocade Fibre Channel switches. Specifically, a low-privileged Webtools user can exploit this flaw to gain administrative privileges beyond their intended access level. The root cause is the transmission of admin and operator authorization headers in an unencrypted form. An attacker with low privileges can intercept these authorization headers, particularly the operator session ID, and manipulate user addition requests by substituting the operator's authorization header. This allows the attacker to create a new user account with admin-level privileges without proper authorization. The vulnerability is classified under CWE-269 (Improper Privilege Management) and has a CVSS v3.1 base score of 8.8, indicating high severity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and only requires low privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the affected system. No known exploits in the wild have been reported yet. This vulnerability poses a significant risk to the security of storage area networks (SANs) managed by Brocade Fabric OS, potentially allowing unauthorized administrative control over critical network infrastructure components.
Potential Impact
For European organizations, this vulnerability could have severe consequences, especially for enterprises relying on Brocade Fibre Channel switches for their SAN infrastructure. Unauthorized administrative access could lead to unauthorized configuration changes, data interception, or disruption of storage network availability. This could impact critical business operations, data integrity, and confidentiality, particularly in sectors such as finance, healthcare, telecommunications, and government where data security and availability are paramount. The ability to create admin users covertly increases the risk of persistent threats and insider-like attacks. Additionally, compromised SAN infrastructure could facilitate lateral movement within the network, escalating the scope of potential damage. Given the high impact on confidentiality, integrity, and availability, exploitation could result in significant operational downtime, data breaches, and regulatory compliance violations under GDPR and other European data protection laws.
Mitigation Recommendations
European organizations should prioritize upgrading Brocade Fabric OS to versions v9.1.1, v9.0.1e, or v8.2.3c or later, where this vulnerability is patched. Until patching is possible, organizations should implement network-level protections such as isolating management interfaces of Brocade switches to trusted networks only, employing VPNs or encrypted tunnels (e.g., IPsec) to secure management traffic, and enforcing strict access controls and monitoring on Webtools usage. Additionally, organizations should audit existing user accounts for unauthorized admin users and review logs for suspicious activities related to user creation or privilege escalation. Implementing multi-factor authentication (MFA) for administrative access, if supported, can further reduce risk. Network intrusion detection systems (NIDS) should be configured to detect anomalous Webtools traffic patterns or unauthorized header manipulations. Finally, educating administrators about the risks of unencrypted management traffic and enforcing encryption best practices can mitigate exploitation vectors.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- brocade
- Date Reserved
- 2022-03-29T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd76f4
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 1:26:18 AM
Last updated: 8/3/2025, 12:45:05 PM
Views: 17
Related Threats
CVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumCVE-2025-55012: CWE-288: Authentication Bypass Using an Alternate Path or Channel in zed-industries zed
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.