First published: Tue Nov 12 2024(Updated: )
A vulnerability in Brocade Fabric OS versions before 9.2.2 could allow man-in-the-middle attackers to conduct remote Service Session Hijacking that may arise from the attacker's ability to forge an SSH key while the Brocade Fabric OS Switch is performing various remote operations initiated by a switch admin.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Brocade FABRIC OS (FOS) | <9.2.2 | |
broadcom fabric operating system | <9.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7516 has been assigned a high severity rating due to its potential to enable man-in-the-middle attacks.
To fix CVE-2024-7516, upgrade Brocade Fabric OS to version 9.2.2 or later.
CVE-2024-7516 allows attackers to conduct remote Service Session Hijacking through SSH key forgery.
Brocade Fabric OS versions prior to 9.2.2 are affected by CVE-2024-7516.
CVE-2024-7516 can be exploited by man-in-the-middle attackers with the capability to forge SSH keys.