DSA-2022-304: Dell Connectrix (Brocade) Security Update for EZswitch Vulnerability

摘要: Dell Connectrix (Brocade) remediation is available for an EZswitch vulnerability in Brocade Fabric OS (FOS) software that may be exploited by malicious users to compromise the affected system. ...

本文章適用於 本文章不適用於 本文無關於任何特定產品。 本文未識別所有產品版本。

影響

Critical

詳細資料

Third-party Component CVE More information
Connectrix (Brocade) FOS CVE-2022-33186 See NVD (http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.) for individual scores for each CVE.
Third-party Component CVE More information
Connectrix (Brocade) FOS CVE-2022-33186 See NVD (http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.) for individual scores for each CVE.
Dell Technologies 建議所有客戶不僅要參考 CVSS 基本分數,也要將可能會影響與特定安全漏洞相關之潛在嚴重性的所有相關暫時和環境分數納入考量。

受影響的產品與補救措施

CVE Addressed Product Affected Versions Updated Versions Link to Update
CVE-2022-33186 Connectrix (Brocade) FOS Brocade Fabric OS (FOS) v9.1.1, v9.0.1e, v8.2.3c, and v7.4.2j and earlier v9.1.1_01
v9.0.1e1,
v8.2.3c1
v7.4.2j1
Link to update
CVE Addressed Product Affected Versions Updated Versions Link to Update
CVE-2022-33186 Connectrix (Brocade) FOS Brocade Fabric OS (FOS) v9.1.1, v9.0.1e, v8.2.3c, and v7.4.2j and earlier v9.1.1_01
v9.0.1e1,
v8.2.3c1
v7.4.2j1
Link to update

因應措施與緩解措施

To remove any exposure to this vulnerability, Brocade Fabric OS switch administrators must disable EZServer support or upgrade to a version of FOS that has the EZServer module removed.

Disabling EZServer is accomplished by using the CLI command "configurechassis." Disabling the EZServer in the switch configuration prevents any exposure to this vulnerability. This option is only available on FOS versions v8.1.0b and later. Customers running on older versions of FOS, including v7.4.2j, do not have this option and must upgrade to FOS v7.4.2j1 to protect their switches.

Customers that elect to upgrade their FOS version can obtain a patch with the EZServer module removed:

  • FOS v9.1.1_01 and higher versions
  • FOS v9.0.1e1 and higher versions
  • FOS v8.2.3c1 and higher versions
  • FOS v7.4.2j1 and higher versions
These patches can be obtained from their standard support customer portal or by contacting their support organization.

Example showing how to disable the EZServer module:
brocadeswitch:admin> configurechassis
Configure...
cfgload attributes (yes, y, no, n): [no]
ssl attributes (yes, y, no, n): [no]
webtools attributes (yes, y, no, n): [no] y
...
Login Session Timeout (in secs): (60..432000) [7200]
EZserver Enabled (yes, y, no, n): [yes] no
...
brocadeswitch:admin >

Notes:
The following actions reenable EZServer on Fabric OS versions that do not have the EZServer module entirely removed:
  • firmwarecleaninstall
  • config removall
  • configdefault
  • factory reset

修訂歷史記錄

RevisionDateDescription
1.02022-11-09Initial Release
2.02023-02-14Corrected "Affected Product" section under "Article Properties."

相關資訊

受影響的產品

Connectrix, Connectrix, Connectrix B-Series, Connectrix B-Series, Brocade 5100, Brocade 6520, Brocade G620, Brocade M6505, Connectrix, Connectrix B-Series Fabric OS 9.X, Connectrix B-Series Software, Connectrix DS-300B, Connectrix DS-6505B , Connectrix DS-6510B, Connectrix DS-6620B, Connectrix DS-6620B-V2, Connectrix DS-6630B, Connectrix DS-6630B-V2, Connectrix DS-7720B, Connectrix DS-7730B, Connectrix ED-DCX6-4B, Connectrix ED-DCX6-8B, Connectrix ED-DCX7-4B, Connectrix ED-DCX7-8B, Connectrix ED-DCX8510-4B, Connectrix ED-DCX8510-8B, Connectrix MP-7800B, Connectrix MP-7810B, Connectrix MP-7840B, Product Security Information ...
文章屬性
文章編號: 000205092
文章類型: Dell Security Advisory
上次修改時間: 18 9月 2025
向其他 Dell 使用者尋求您問題的答案
支援服務
檢查您的裝置是否在支援服務的涵蓋範圍內。