First published: Thu Aug 12 2021(Updated: )
The command ipfilter in Brocade Fabric OS before Brocade Fabric OS v.9.0.1a, v8.2.3, and v8.2.0_CBN4, and v7.4.2h uses unsafe string function to process user input. Authenticated attackers can abuse this vulnerability to exploit stack-based buffer overflows, allowing execution of arbitrary code as the root user account.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Fabric Operating System | <7.4.2h | |
Broadcom Fabric Operating System | >=8.0.0<8.2.0_cbn4 | |
Broadcom Fabric Operating System | >=8.2.1<8.2.3 | |
Broadcom Fabric Operating System | >=9.0.0<9.0.1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27790 is a vulnerability in Brocade Fabric OS that allows authenticated attackers to exploit stack-based buffer overflows, leading to the execution of arbitrary code.
The severity of CVE-2021-27790 is rated as high with a severity value of 7.8.
Authenticated attackers can abuse CVE-2021-27790 by using the unsafe string function in the 'ipfilter' command in Brocade Fabric OS to process user input, leading to stack-based buffer overflows.
Versions before Brocade Fabric OS v.9.0.1a, v8.2.3, v8.2.0_CBN4, and v7.4.2h are affected by CVE-2021-27790.
To fix CVE-2021-27790, it is recommended to update Brocade Fabric OS to version 9.0.1a, v8.2.3, v8.2.0_CBN4, or v7.4.2h.