DSA-2022-304: Dell Connectrix (Brocade) Security Update for EZswitch Vulnerability

Resumo: Dell Connectrix (Brocade) remediation is available for an EZswitch vulnerability in Brocade Fabric OS (FOS) software that may be exploited by malicious users to compromise the affected system. ...

Este artigo aplica-se a Este artigo não se aplica a Este artigo não está vinculado a nenhum produto específico. Nem todas as versões do produto estão identificadas neste artigo.

Impacto

Critical

Dados

Third-party Component CVE More information
Connectrix (Brocade) FOS CVE-2022-33186 See NVD (http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.) for individual scores for each CVE.
Third-party Component CVE More information
Connectrix (Brocade) FOS CVE-2022-33186 See NVD (http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.) for individual scores for each CVE.
A Dell Technologies recomenda que todos os clientes levem em consideração a pontuação base CVSS e as pontuações temporais e ambientais pertinentes que possam afetar a gravidade potencial associada a uma vulnerabilidade de segurança específica.

Produtos afetados e soluções

CVE Addressed Product Affected Versions Updated Versions Link to Update
CVE-2022-33186 Connectrix (Brocade) FOS Brocade Fabric OS (FOS) v9.1.1, v9.0.1e, v8.2.3c, and v7.4.2j and earlier v9.1.1_01
v9.0.1e1,
v8.2.3c1
v7.4.2j1
Link to update
CVE Addressed Product Affected Versions Updated Versions Link to Update
CVE-2022-33186 Connectrix (Brocade) FOS Brocade Fabric OS (FOS) v9.1.1, v9.0.1e, v8.2.3c, and v7.4.2j and earlier v9.1.1_01
v9.0.1e1,
v8.2.3c1
v7.4.2j1
Link to update

Soluções temporárias e atenuações

To remove any exposure to this vulnerability, Brocade Fabric OS switch administrators must disable EZServer support or upgrade to a version of FOS that has the EZServer module removed.

Disabling EZServer is accomplished by using the CLI command "configurechassis." Disabling the EZServer in the switch configuration prevents any exposure to this vulnerability. This option is only available on FOS versions v8.1.0b and later. Customers running on older versions of FOS, including v7.4.2j, do not have this option and must upgrade to FOS v7.4.2j1 to protect their switches.

Customers that elect to upgrade their FOS version can obtain a patch with the EZServer module removed:

  • FOS v9.1.1_01 and higher versions
  • FOS v9.0.1e1 and higher versions
  • FOS v8.2.3c1 and higher versions
  • FOS v7.4.2j1 and higher versions
These patches can be obtained from their standard support customer portal or by contacting their support organization.

Example showing how to disable the EZServer module:
brocadeswitch:admin> configurechassis
Configure...
cfgload attributes (yes, y, no, n): [no]
ssl attributes (yes, y, no, n): [no]
webtools attributes (yes, y, no, n): [no] y
...
Login Session Timeout (in secs): (60..432000) [7200]
EZserver Enabled (yes, y, no, n): [yes] no
...
brocadeswitch:admin >

Notes:
The following actions reenable EZServer on Fabric OS versions that do not have the EZServer module entirely removed:
  • firmwarecleaninstall
  • config removall
  • configdefault
  • factory reset

Histórico de revisão

RevisionDateDescription
1.02022-11-09Initial Release
2.02023-02-14Corrected "Affected Product" section under "Article Properties."

Informações relacionadas

Produtos afetados

Connectrix, Connectrix, Connectrix B-Series, Connectrix B-Series, Brocade 5100, Brocade 6520, Brocade G620, Brocade M6505, Connectrix, Connectrix B-Series Fabric OS 9.X, Connectrix B-Series Software, Connectrix DS-300B, Connectrix DS-6505B , Connectrix DS-6510B, Connectrix DS-6620B, Connectrix DS-6620B-V2, Connectrix DS-6630B, Connectrix DS-6630B-V2, Connectrix DS-7720B, Connectrix DS-7730B, Connectrix ED-DCX6-4B, Connectrix ED-DCX6-8B, Connectrix ED-DCX7-4B, Connectrix ED-DCX7-8B, Connectrix ED-DCX8510-4B, Connectrix ED-DCX8510-8B, Connectrix MP-7800B, Connectrix MP-7810B, Connectrix MP-7840B, Product Security Information ...
Propriedades do artigo
Número do artigo: 000205092
Tipo de artigo: Dell Security Advisory
Último modificado: 18 set. 2025
Encontre as respostas de outros usuários da Dell para suas perguntas.
Serviços de suporte
Verifique se o dispositivo está coberto pelos serviços de suporte.