First published: Thu Aug 12 2021(Updated: )
The request handling functions in web management interface of Brocade Fabric OS versions before v9.0.1a, v8.2.3a, and v7.4.2h do not properly handle malformed user input, resulting in a service crash. An authenticated attacker could use this weakness to cause the FOS HTTP application handler to crash, requiring a reboot.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Fabric Operating System | <7.4.2h | |
Broadcom Fabric Operating System | >=8.0.0<8.2.3a | |
Broadcom Fabric Operating System | >=9.0.0<9.0.1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27792 is a vulnerability in Brocade Fabric OS versions before v9.0.1a, v8.2.3a, and v7.4.2h that allows an authenticated attacker to cause a service crash by exploiting a weakness in the handling of malformed user input in the web management interface.
CVE-2021-27792 has a severity rating of 7.8, which is considered high.
Brocade Fabric OS versions before v9.0.1a, v8.2.3a, and v7.4.2h are affected by CVE-2021-27792.
An authenticated attacker can exploit CVE-2021-27792 by sending malformed user input to the web management interface of affected Brocade Fabric OS versions, causing a service crash.
Yes, you can find references for CVE-2021-27792 at the following links: [NetApp Security Advisory](https://security.netapp.com/advisory/ntap-20210819-0002/), [Brocade Security Advisory 2021-1490](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1490), [Brocade Security Advisory 2021-1492](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1492).