Skip to main content

CVE-2022-33181: Information disclosure vulnerability in Brocade Fabric OS

Medium
VulnerabilityCVE-2022-33181cvecve-2022-33181
Published: Tue Oct 25 2022 (10/25/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Brocade Fabric OS

Description

An information disclosure vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, 7.4.2.j could allow a local authenticated attacker to read sensitive files using switch commands “configshow” and “supportlink”.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:55:44 UTC

Technical Analysis

CVE-2022-33181 is an information disclosure vulnerability affecting Brocade Fabric OS (FOS) CLI versions prior to 9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, and 7.4.2.j. Brocade Fabric OS is the operating system used in Brocade Fibre Channel switches, which are critical components in Storage Area Networks (SANs) for enterprise data centers. The vulnerability allows a local authenticated attacker with low privileges to execute specific switch commands, namely "configshow" and "supportlink", to read sensitive files on the device. This could expose confidential configuration data or other sensitive information stored on the switch. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.5 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). No known exploits in the wild have been reported, and no official patches or mitigation links were provided in the source data. The vulnerability requires local authenticated access, meaning an attacker must have some level of access to the switch CLI to exploit it. The impact is primarily the unauthorized disclosure of sensitive information, which could facilitate further attacks or unauthorized access if the disclosed data includes credentials or network topology details.

Potential Impact

For European organizations, especially those operating large-scale data centers or enterprises relying on Brocade Fibre Channel SAN infrastructure, this vulnerability poses a risk of sensitive information leakage. Disclosure of configuration files or support data could reveal network architecture, authentication credentials, or other critical operational details. This information could be leveraged by malicious insiders or attackers who have gained limited access to escalate privileges or move laterally within the network. While the vulnerability does not directly allow code execution or denial of service, the confidentiality breach can undermine the security posture and lead to subsequent attacks. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive data is exposed. The requirement for local authenticated access limits the threat to insiders or attackers who have already compromised some level of access, but given the critical role of Brocade switches in SANs, even limited access can be significant. The absence of known exploits in the wild reduces immediate risk, but the medium severity rating and potential impact warrant timely remediation.

Mitigation Recommendations

1. Upgrade Brocade Fabric OS to the fixed versions: v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, or 7.4.2.j as soon as possible to eliminate the vulnerability. 2. Restrict CLI access strictly to trusted administrators and implement strong authentication mechanisms, including multi-factor authentication where supported, to prevent unauthorized local access. 3. Monitor and audit CLI command usage, especially commands like "configshow" and "supportlink", to detect any unusual or unauthorized activity. 4. Segment management networks to isolate Brocade switches from general user networks, reducing the attack surface for local attackers. 5. Review and harden switch configurations to minimize stored sensitive information and ensure least privilege principles are applied to user roles. 6. Implement network-level monitoring for anomalous behavior around SAN management traffic. 7. Maintain an up-to-date inventory of Brocade devices and their firmware versions to prioritize patching and vulnerability management efforts. 8. If immediate patching is not feasible, consider disabling or restricting the vulnerable commands if possible, or limit access to the CLI via network controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
brocade
Date Reserved
2022-06-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd98b6

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 1:55:44 PM

Last updated: 7/29/2025, 8:26:17 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats