First published: Fri Sep 25 2020(Updated: )
A vulnerability in the command-line interface in Brocade Fabric OS before Brocade Fabric OS v8.2.2a1, 8.2.2c, v7.4.2g, v8.2.0_CBN3, v8.2.1e, v8.1.2k, v9.0.0, could allow a local authenticated attacker to modify shell variables, which may lead to an escalation of privileges or bypassing the logging.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Fabric Operating System | <7.4.2g | |
Broadcom Fabric Operating System | >=8.0.0<8.1.2k | |
Broadcom Fabric Operating System | >=8.2.0<8.2.0_cbn3 | |
Broadcom Fabric Operating System | >=8.2.1<8.2.1e | |
Broadcom Fabric Operating System | >=8.2.2<8.2.2a1 | |
Broadcom Fabric Operating System | >=8.2.2b<8.2.2c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-15372 is medium with a severity value of 5.5.
The affected software for CVE-2020-15372 is Brocade Fabric OS before Brocade Fabric OS v8.2.2a1, 8.2.2c, v7.4.2g, v8.2.0_CBN3, v8.2.1e, v8.1.2k, v9.0.0.
A local authenticated attacker can exploit CVE-2020-15372 by modifying shell variables, which may lead to an escalation of privileges or bypassing the logging.
To fix CVE-2020-15372, it is recommended to update to Brocade Fabric OS v8.2.2a1, 8.2.2c, v7.4.2g, v8.2.0_CBN3, v8.2.1e, v8.1.2k, v9.0.0 or later.
You can find more information about CVE-2020-15372 on the Broadcom website at https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1081.