First published: Tue Oct 25 2022(Updated: )
A vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, 7.4.2.j could allow a remote authenticated attacker to perform stack buffer overflow using in “firmwaredownload” and “diagshow” commands.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Fabric Operating System | <7.4.2.j | |
Broadcom Fabric Operating System | >=8.0.0<8.2.3c | |
Broadcom Fabric Operating System | >=9.0.0<9.0.1e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-33183 is high with a CVSS score of 8.8.
CVE-2022-33183 allows a remote authenticated attacker to perform stack buffer overflow using the "firmwaredownload" and "diagshow" commands in Brocade Fabric OS CLI.
CVE-2022-33183 affects Brocade Fabric OS versions before v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, and 7.4.2.j.
Yes, updates are available to fix CVE-2022-33183. Please refer to the vendor's advisory or support website for the latest patches.
To mitigate the impact of CVE-2022-33183, it is recommended to apply the latest security patches provided by the vendor and follow best security practices.