Skip to main content

CVE-2022-28169: Privilege escalation in Brocade Fabric OS

High
VulnerabilityCVE-2022-28169cvecve-2022-28169
Published: Tue Oct 25 2022 (10/25/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Brocade Fabric OS

Description

Brocade Webtools in Brocade Fabric OS versions before Brocade Fabric OS versions v9.1.1, v9.0.1e, and v8.2.3c could allow a low privilege webtools, user, to gain elevated admin rights, or privileges, beyond what is intended or entitled for that user. By exploiting this vulnerability, a user whose role is not an admin can create a new user with an admin role using the operator session id. The issue was replicated after intercepting the admin, and operator authorization headers sent unencrypted and editing a user addition request to use the operator's authorization header.

AI-Powered Analysis

AILast updated: 07/05/2025, 01:26:18 UTC

Technical Analysis

CVE-2022-28169 is a high-severity privilege escalation vulnerability affecting Brocade Fabric OS versions prior to v9.1.1, v9.0.1e, and v8.2.3c. The vulnerability resides in the Brocade Webtools component, which is used for managing Brocade Fibre Channel switches. Specifically, a low-privileged Webtools user can exploit this flaw to gain administrative privileges beyond their intended access level. The root cause is the transmission of admin and operator authorization headers in an unencrypted form. An attacker with low privileges can intercept these authorization headers, particularly the operator session ID, and manipulate user addition requests by substituting the operator's authorization header. This allows the attacker to create a new user account with admin-level privileges without proper authorization. The vulnerability is classified under CWE-269 (Improper Privilege Management) and has a CVSS v3.1 base score of 8.8, indicating high severity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and only requires low privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the affected system. No known exploits in the wild have been reported yet. This vulnerability poses a significant risk to the security of storage area networks (SANs) managed by Brocade Fabric OS, potentially allowing unauthorized administrative control over critical network infrastructure components.

Potential Impact

For European organizations, this vulnerability could have severe consequences, especially for enterprises relying on Brocade Fibre Channel switches for their SAN infrastructure. Unauthorized administrative access could lead to unauthorized configuration changes, data interception, or disruption of storage network availability. This could impact critical business operations, data integrity, and confidentiality, particularly in sectors such as finance, healthcare, telecommunications, and government where data security and availability are paramount. The ability to create admin users covertly increases the risk of persistent threats and insider-like attacks. Additionally, compromised SAN infrastructure could facilitate lateral movement within the network, escalating the scope of potential damage. Given the high impact on confidentiality, integrity, and availability, exploitation could result in significant operational downtime, data breaches, and regulatory compliance violations under GDPR and other European data protection laws.

Mitigation Recommendations

European organizations should prioritize upgrading Brocade Fabric OS to versions v9.1.1, v9.0.1e, or v8.2.3c or later, where this vulnerability is patched. Until patching is possible, organizations should implement network-level protections such as isolating management interfaces of Brocade switches to trusted networks only, employing VPNs or encrypted tunnels (e.g., IPsec) to secure management traffic, and enforcing strict access controls and monitoring on Webtools usage. Additionally, organizations should audit existing user accounts for unauthorized admin users and review logs for suspicious activities related to user creation or privilege escalation. Implementing multi-factor authentication (MFA) for administrative access, if supported, can further reduce risk. Network intrusion detection systems (NIDS) should be configured to detect anomalous Webtools traffic patterns or unauthorized header manipulations. Finally, educating administrators about the risks of unencrypted management traffic and enforcing encryption best practices can mitigate exploitation vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
brocade
Date Reserved
2022-03-29T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd76f4

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 1:26:18 AM

Last updated: 8/3/2025, 12:45:05 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats