First published: Fri Dec 11 2020(Updated: )
Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Fabric Operating System | <7.4.2g | |
Broadcom Fabric Operating System | >=8.0.0<8.1.2k | |
Broadcom Fabric Operating System | >=8.2.0<8.2.0_cbn3 | |
Broadcom Fabric Operating System | >=8.2.1<8.2.1e | |
Broadcom Fabric Operating System | >=8.2.2b<8.2.2c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-15375.
The severity of CVE-2020-15375 is medium with a severity value of 6.7.
Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g are affected by CVE-2020-15375.
CVE-2020-15375 is an improper input validation weakness in the command line interface of Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g, which could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.
To fix CVE-2020-15375, it is recommended to update Brocade Fabric OS to versions v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g or later.