We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-7517

Privileged escalation via crafted use of portcfg command



Description

A command injection vulnerability in Brocade Fabric OS before 9.2.0c, and 9.2.1 through 9.2.1a on IP extension platforms could allow a local authenticated attacker to perform a privileged escalation via crafted use of the portcfg command. This specific exploitation is only possible on IP Extension platforms: Brocade 7810, Brocade 7840, Brocade 7850 and on Brocade X6 or X7 directors with an SX-6 Extension blade installed. The attacker must be logged into the switch via SSH or serial console to conduct the attack.

Reserved 2024-08-05 | Published 2024-11-21 | Updated 2024-11-21 | Assigner brocade


HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-77: Improper Neutralization of Special Elements used in a Command

Product status

Default status
unaffected

Brocade Fabric OS versions before 9.2.0c, and 9.2.1 through 9.2.1a
affected

References

support.broadcom.com/...l/content/SecurityAdvisories/0/25071

cve.org (CVE-2024-7517)

nvd.nist.gov (CVE-2024-7517)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-7517

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.