BSA-2020-1083
21562
20 November 2020
08 September 2020
Closed
Medium
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H – 6.7
No
CVE-2020-15375
Summary Security Advisory ID : BSA-2020-1083 Component : secccrypptocfg Revision : 2.0
Brocade Fabric OS before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contains an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.
Affected Products
Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g.
Products Confirmed Not Vulnerable
No other Brocade Fibe Channel Products from Broadcom products are currently known to be affected by this vulnerability.
Solution
A security update is provided in Brocade Fabric OS versions v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g.
All later versions of Brocade Fabric OS, including all FOS 9.X releases, will also contain this same security update.
Recommended Action
Brocade recommends that all customers running the impacted version(s) upgrade to one of the identified patch levels or a higher version of Brocade Fabric OS to obtain this update.
Credit
This issue was discovered through security testing.
Revision History
Version | Change | Date |
---|---|---|
1.0 | Initial Publication | September 08, 2020 |
2.0 | CVSS Score Change | November 20, 2020 |