First published: Thu Feb 08 2018(Updated: )
A vulnerability in the IPv6 stack on Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) versions before 7.4.2b, 8.1.2 and 8.2.0 could allow an attacker to cause a denial of service (CPU consumption and device hang) condition by sending crafted Router Advertisement (RA) messages to a targeted system.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Fabric Operating System | <7.4.2b | |
Broadcom Fabric Operating System | =8.0.0 | |
Broadcom Fabric Operating System | =8.0.1 | |
Broadcom Fabric Operating System | =8.0.2 | |
Broadcom Fabric Operating System | =8.1.0 | |
Broadcom Fabric Operating System | =8.1.1 | |
Broadcom Fabric Operating System | =8.1.2 | |
Brocade Fabric OS | =8.0.2b2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2017-6227.
The severity of CVE-2017-6227 is medium with a severity value of 6.5.
Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) versions before 7.4.2b, 8.1.2 and 8.2.0 are affected by CVE-2017-6227.
CVE-2017-6227 could allow an attacker to cause a denial of service (CPU consumption and device hang) condition by sending crafted Router Advertisement (RA) messages to the affected devices.
To fix CVE-2017-6227, it is recommended to upgrade to Brocade Fabric OS (FOS) versions 7.4.2b, 8.1.2 or 8.2.0.