Code injection exposure in Fabric OS 9.1.0 through 9.1.1d6
25602
17 April 2025
17 April 2025
CLOSED
CRITICAL
8.6 High - CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVE-2025-1976
Brocade Security Advisory ID |
BSA-2025-2930 |
Component |
Input Validation |
CWE |
CWE-94: Improper Control of Generation of Code (‘Code Injection’) |
|
|
Summary
Brocade Fabric OS versions starting with 9.1.0 have root access removed, however, a local user with admin privilege can potentially execute arbitrary code with full root privileges on Fabric OS versions 9.1.0 through 9.1.1d6.
Description
Through a flaw in IP Address validation, a local user, assigned one of the pre-defined admin roles or a user-defined role with admin-level privileges, can execute arbitrary code as if they had full root level access. This vulnerability can allow the user to execute any existing Fabric OS command or can also be used to modify the Fabric OS itself, including adding their own subroutines. Even though achieving this exploit first requires valid access to a role with admin privileges, this vulnerability has been actively exploited in the field.
Products Affected
- Brocade Fabric OS versions 9.1.0 through 9.1.1d6
Products Not Affected
- Brocade Fabric OS versions 9.2.0 and later
- Brocade ASCG is not affected by this vulnerability
- Brocade SANnav is not affected by this vulnerability
Solution
- Security update provided in Brocade Fabric OS 9.1.1d7
Note
Versions of Fabric OS before 9.1.0 allow the switch ADMIN role to directly access root. Brocade PSIRT recommends customers to upgrade to a version of Fabric OS that has removed root access for enhanced security where possible.
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
April 17, 2025 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.