First published: Wed Jun 09 2021(Updated: )
Running security scans against the SAN switch can cause config and secnotify processes within the firmware before Brocade Fabric OS v9.0.0, v8.2.2d and v8.2.1e to consume all memory leading to denial of service impacts possibly including a switch panic.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Fabric Operating System | <8.2.1 | |
Broadcom Fabric Operating System | =8.2.1 | |
Broadcom Fabric Operating System | =8.2.1a | |
Broadcom Fabric Operating System | =8.2.1b | |
Broadcom Fabric Operating System | =8.2.1c | |
Broadcom Fabric Operating System | =8.2.1d | |
Broadcom Fabric Operating System | =8.2.2a1 | |
Broadcom Fabric Operating System | =8.2.2b | |
Broadcom Fabric Operating System | =8.2.2c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15383 refers to a vulnerability in Brocade Fabric Operating System (FOS) versions before v9.0.0, v8.2.2d, and v8.2.1e, which can be exploited by running security scans against the SAN switch, causing the config and secnotify processes to consume all memory leading to denial of service impacts, including a switch panic.
CVE-2020-15383 can cause the config and secnotify processes within the firmware of Brocade Fabric OS to consume all memory, resulting in denial of service impacts and potentially causing a switch panic.
CVE-2020-15383 has a severity of 7.5 (high).
Brocade Fabric Operating System (FOS) versions before v9.0.0, v8.2.2d, and v8.2.1e are affected by CVE-2020-15383.
To mitigate CVE-2020-15383, it is recommended to upgrade Brocade Fabric Operating System (FOS) to version v9.0.0 or higher.