First published: Mon May 08 2017(Updated: )
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected versions, non-root users can gain root access with a combination of shell commands and parameters.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Fabric Operating System | <=7.4.1c | |
Broadcom Fabric Operating System | =8.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8202 is considered a high-severity privilege escalation vulnerability.
To fix CVE-2016-8202, upgrade to Brocade Fabric OS versions 7.4.1d or 8.0.1b and later.
CVE-2016-8202 affects Brocade Fibre Channel SAN products running versions below 7.4.1d and 8.0.1b of Brocade Fabric OS.
An authenticated attacker with access to the command line interface can exploit CVE-2016-8202.
The potential impact of CVE-2016-8202 includes unauthorized privilege escalation for user accounts in affected Brocade systems.