First published: Fri Sep 25 2020(Updated: )
Multiple buffer overflow vulnerabilities in REST API in Brocade Fabric OS versions v8.2.1 through v8.2.1d, and 8.2.2 versions before v8.2.2c could allow remote unauthenticated attackers to perform various attacks.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Fabric Operating System | =8.2.1 | |
Broadcom Fabric Operating System | =8.2.1a | |
Broadcom Fabric Operating System | =8.2.1b | |
Broadcom Fabric Operating System | =8.2.1c | |
Broadcom Fabric Operating System | =8.2.1d | |
Broadcom Fabric Operating System | =8.2.2 | |
Broadcom Fabric Operating System | =8.2.2a | |
Broadcom Fabric Operating System | =8.2.2a1 | |
Broadcom Fabric Operating System | =8.2.2b | |
Broadcom Fabric Operating System | =8.2.2c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15373 is a vulnerability in the REST API in Brocade Fabric OS versions v8.2.1 through v8.2.1d, and 8.2.2 versions before v8.2.2c that could allow remote unauthenticated attackers to perform various attacks.
CVE-2020-15373 has a severity rating of 9.8 out of 10, making it critical.
CVE-2020-15373 affects Brocade Fabric OS versions v8.2.1 through v8.2.1d, and 8.2.2 versions before v8.2.2c.
Remote unauthenticated attackers can exploit CVE-2020-15373 through the REST API in Brocade Fabric OS.
You can find more information about CVE-2020-15373 at the following reference: https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1082