First published: Thu Nov 21 2024(Updated: )
A command injection vulnerability in Brocade Fabric OS before 9.2.0c, and 9.2.1 through 9.2.1a on IP extension platforms could allow a local authenticated attacker to perform a privileged escalation via crafted use of the portcfg command. This specific exploitation is only possible on IP Extension platforms: Brocade 7810, Brocade 7840, Brocade 7850 and on Brocade X6 or X7 directors with an SX-6 Extension blade installed. The attacker must be logged into the switch via SSH or serial console to conduct the attack.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Brocade FABRIC OS (FOS) | <9.2.0c>=9.2.1<9.2.1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-7517 is high due to its potential for local privileged escalation.
To fix CVE-2024-7517, update Brocade Fabric OS to version 9.2.0d or later.
CVE-2024-7517 affects users of Brocade Fabric OS versions prior to 9.2.0d and between 9.2.1 and 9.2.1a.
CVE-2024-7517 can be exploited through command injection, allowing a local authenticated attacker to escalate privileges.
No, CVE-2024-7517 is not remotely exploitable as it requires local authenticated access.