Code injection exposure in Fabric OS 9.1.0 through 9.1.1d6

Brocade Directors

3 more products

25602

17 April 2025

17 April 2025

CLOSED

CRITICAL

8.6 High - CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CVE-2025-1976

Brocade Security Advisory ID

BSA-2025-2930

Component

Input Validation

CWE

CWE-94: Improper Control of Generation of Code (‘Code Injection’)

 

 

Summary 

Brocade Fabric OS versions starting with 9.1.0 have root access removed, however, a local user with admin privilege can potentially execute arbitrary code with full root privileges on Fabric OS versions 9.1.0 through 9.1.1d6.

 

Description

Through a flaw in IP Address validation, a local user, assigned one of the pre-defined admin roles or a user-defined role with admin-level privileges, can execute arbitrary code as if they had full root level access. This vulnerability can allow the user to execute any existing Fabric OS command or can also be used to modify the Fabric OS itself, including adding their own subroutines. Even though achieving this exploit first requires valid access to a role with admin privileges, this vulnerability has been actively exploited in the field. 

 

Products Affected

  • Brocade Fabric OS versions 9.1.0 through 9.1.1d6

Products Not Affected

  • Brocade Fabric OS versions 9.2.0 and later
  • Brocade ASCG is not affected by this vulnerability
  • Brocade SANnav is not affected by this vulnerability

 

Solution

  • Security update provided in Brocade Fabric OS 9.1.1d7

 

Note

Versions of Fabric OS before 9.1.0 allow the switch ADMIN role to directly access root.  Brocade PSIRT recommends customers to upgrade to a version of Fabric OS that has removed root access for enhanced security where possible.  

 

Revision History

Version

Change

Date

1.0

Initial Publication

April 17, 2025

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.