DSA-2022-304: Dell Connectrix (Brocade) Security Update for EZswitch Vulnerability
摘要: Dell Connectrix (Brocade) remediation is available for an EZswitch vulnerability in Brocade Fabric OS (FOS) software that may be exploited by malicious users to compromise the affected system. ...
本文章適用於
本文章不適用於
本文無關於任何特定產品。
本文未識別所有產品版本。
影響
Critical
詳細資料
| Third-party Component | CVE | More information |
| Connectrix (Brocade) FOS | CVE-2022-33186 | See NVD (http://nvd.nist.gov/ |
| Third-party Component | CVE | More information |
| Connectrix (Brocade) FOS | CVE-2022-33186 | See NVD (http://nvd.nist.gov/ |
受影響的產品與補救措施
| CVE Addressed | Product | Affected Versions | Updated Versions | Link to Update |
| CVE-2022-33186 | Connectrix (Brocade) FOS | Brocade Fabric OS (FOS) v9.1.1, v9.0.1e, v8.2.3c, and v7.4.2j and earlier | v9.1.1_01 v9.0.1e1, v8.2.3c1 v7.4.2j1 |
Link to update |
| CVE Addressed | Product | Affected Versions | Updated Versions | Link to Update |
| CVE-2022-33186 | Connectrix (Brocade) FOS | Brocade Fabric OS (FOS) v9.1.1, v9.0.1e, v8.2.3c, and v7.4.2j and earlier | v9.1.1_01 v9.0.1e1, v8.2.3c1 v7.4.2j1 |
Link to update |
因應措施與緩解措施
To remove any exposure to this vulnerability, Brocade Fabric OS switch administrators must disable EZServer support or upgrade to a version of FOS that has the EZServer module removed.
Disabling EZServer is accomplished by using the CLI command "configurechassis." Disabling the EZServer in the switch configuration prevents any exposure to this vulnerability. This option is only available on FOS versions v8.1.0b and later. Customers running on older versions of FOS, including v7.4.2j, do not have this option and must upgrade to FOS v7.4.2j1 to protect their switches.
Customers that elect to upgrade their FOS version can obtain a patch with the EZServer module removed:
- FOS v9.1.1_01 and higher versions
- FOS v9.0.1e1 and higher versions
- FOS v8.2.3c1 and higher versions
- FOS v7.4.2j1 and higher versions
Example showing how to disable the EZServer module:
brocadeswitch:admin> configurechassis Configure... cfgload attributes (yes, y, no, n): [no] ssl attributes (yes, y, no, n): [no] webtools attributes (yes, y, no, n): [no] y ... Login Session Timeout (in secs): (60..432000) [7200] EZserver Enabled (yes, y, no, n): [yes] no ... brocadeswitch:admin >
Notes:
The following actions reenable EZServer on Fabric OS versions that do not have the EZServer module entirely removed:
- firmwarecleaninstall
- config removall
- configdefault
- factory reset
修訂歷史記錄
| Revision | Date | Description |
| 1.0 | 2022-11-09 | Initial Release |
| 2.0 | 2023-02-14 | Corrected "Affected Product" section under "Article Properties." |
相關資訊
法律免責聲明
受影響的產品
Connectrix, Connectrix, Connectrix B-Series, Connectrix B-Series, Brocade 5100, Brocade 6520, Brocade G620, Brocade M6505, Connectrix, Connectrix B-Series Fabric OS 9.X, Connectrix B-Series Software, Connectrix DS-300B, Connectrix DS-6505B
, Connectrix DS-6510B, Connectrix DS-6620B, Connectrix DS-6620B-V2, Connectrix DS-6630B, Connectrix DS-6630B-V2, Connectrix DS-7720B, Connectrix DS-7730B, Connectrix ED-DCX6-4B, Connectrix ED-DCX6-8B, Connectrix ED-DCX7-4B, Connectrix ED-DCX7-8B, Connectrix ED-DCX8510-4B, Connectrix ED-DCX8510-8B, Connectrix MP-7800B, Connectrix MP-7810B, Connectrix MP-7840B, Product Security Information
...
文章屬性
文章編號: 000205092
文章類型: Dell Security Advisory
上次修改時間: 18 9月 2025
向其他 Dell 使用者尋求您問題的答案
支援服務
檢查您的裝置是否在支援服務的涵蓋範圍內。