Directory transversal vulnerability in Brocade Fabric OS before 9.2.1c2 and 9.2.2 through 9.2.2a using various shell commands (CVE-2025-58381)
36853
27 January 2026
27 January 2026
CLOSED
MEDIUM
4.6 Medium - CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CVE-2025-58381
|
Brocade Security Advisory ID |
BSA-2026-3302 |
|
Component |
Shell |
|
CWE |
CWE-209: Generation of Error Message Containing Sensitive Information |
|
|
|
Summary
A vulnerability in Brocade Fabric OS before 9.2.1c2 could allow an authenticated attacker with admin privileges using the shell commands “source, ping6, sleep, disown, wait to modify the path variables and move upwards in the directory structure or to traverse to different directories.
Products Affected
- Brocade Fabric OS before Brocade Fabric OS 9.2.1c2 and 9.2.2 through 9.2.2a
Products Not Affected
- Brocade SANnav is not affected by this vulnerability
[VEX Justification: Component_not_present] - Brocade ASCG is not affected by this vulnerability
[VEX Justification: Component_not_present]
Solution
- Security update provided in Brocade Fabric OS versions 10.0.0, 9.2.2b, and 9.2.1c2
Credit
The vulnerability was found during internal testing
Revision History
|
Version |
Change |
Date |
|
1.0 |
Initial Publication |
1/27/2027 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.