A command injection vulnerability in Brocade Fabric OS before 9.2.0c, and 9.2.1 through 9.2.1a on IP extension platforms could allow a local authenticated attacker to perform a privileged escalation via crafted use of the portcfg command.
This specific exploitation is only possible on IP Extension platforms: Brocade 7810, Brocade 7840, Brocade 7850 and on Brocade X6 or X7 directors with an SX-6 Extension blade installed. The attacker must be logged into the switch via SSH or serial console to conduct the attack.
References
| Link | Resource |
|---|---|
| https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25071 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-11-21 11:15
Updated : 2026-01-30 21:24
NVD link : CVE-2024-7517
Mitre link : CVE-2024-7517
CVE.ORG link : CVE-2024-7517
JSON object : View
Products Affected
brocade
- fabric_operating_system
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
