{"vuid":"VU#853246","idnumber":"853246","name":"Brocade BigIron RX switch ACL bypass vulnerability","keywords":["BigIron","ACL Bypass"],"overview":"Brocade BigIron RX switch devices are susceptible to an access control list (ACL) bypass vulnerability by sending packets with the source port 179.","clean_desc":"Brocade BigIron RX switch devices do not properly restricted packets sent with a source port of 179. Port 179 is commonly used for Border Gateway Protocol (BGP) communication. It has been reported that individual packets with a source port of 179 are allowed through, as well as, full SSH and RDP sessions.","impact":"A remote unauthenticated attacker can bypass any ACL rule on a BigIron RX switch device.","resolution":"Apply an Update\nBrocade has created software defect 355173 for this issue.  The following patch releases address this vulnerability; RX 2.8.00a, 2.7.03b, and 2.7.02l. Customers should contact Brocade support to download these updates.","workarounds":"Workaround Do not depend on BigIron RX switch devices to provide restricted access to any network infrastructure. Use a separate trusted firewall device to restrict access.","sysaffected":"","thanks":"Thanks to Bashar Ewaida for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["h","t","t","p",":","/","/","w","w","w",".","b","r","o","c","a","d","e",".","c","o","m","/","p","r","o","d","u","c","t","s","/","a","l","l","/","s","w","i","t","c","h","e","s","/","p","r","o","d","u","c","t","-","d","e","t","a","i","l","s","/","b","i","g","i","r","o","n","-","r","x","-","s","e","r","i","e","s","/","i","n","d","e","x",".","p","a","g","e"],"cveids":["CVE-2011-4884"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-05-13T12:45:07Z","publicdate":"2011-07-13T00:00:00Z","datefirstpublished":"2011-07-13T10:45:54Z","dateupdated":"2012-02-03T21:02:38Z","revision":25,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"9","cam_exploitation":"6","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"5","cam_easeofexploitation":"3","cam_attackeraccessrequired":"4","cam_scorecurrent":"0.28125","cam_scorecurrentwidelyknown":"0.405","cam_scorecurrentwidelyknownexploited":"0.5625","ipprotocol":"tcp","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.28125,"vulnote":null}