CVE-2021-27792

The request handling functions in web management interface of Brocade Fabric OS versions before v9.0.1a, v8.2.3a, and v7.4.2h do not properly handle malformed user input, resulting in a service crash. An authenticated attacker could use this weakness to cause the FOS HTTP application handler to crash, requiring a reboot.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-20 NVD-CWE-noinfo

23 Aug 2021, 14:51

Type Values Removed Values Added
CPE cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
CWE CWE-20
CVSS v2 : unknown
v3 : unknown
v2 : 7.2
v3 : 7.8
References (MISC) https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1490 - (MISC) https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1490 - Vendor Advisory
References (MISC) https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1492 - (MISC) https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1492 - Vendor Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20210819-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20210819-0002/ - Third Party Advisory

20 Aug 2021, 17:15

Type Values Removed Values Added
Summary The command “ipfilter” in Brocade Fabric OS before Brocade Fabric OS v.9.0.1a, v8.2.3, and v8.2.0_CBN4, and v7.4.2h uses unsafe string function to process user input. Authenticated attackers can abuse this vulnerability to exploit stack-based buffer overflows, allowing execution of arbitrary code as the root user account. The request handling functions in web management interface of Brocade Fabric OS versions before v9.0.1a, v8.2.3a, and v7.4.2h do not properly handle malformed user input, resulting in a service crash. An authenticated attacker could use this weakness to cause the FOS HTTP application handler to crash, requiring a reboot.
References
  • (MISC) https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1490 -

19 Aug 2021, 10:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210819-0002/ -

12 Aug 2021, 15:39

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-12 15:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-27792

Mitre link : CVE-2021-27792

CVE.ORG link : CVE-2021-27792


JSON object : View

Products Affected

broadcom

  • fabric_operating_system