CVE-2022-33185

Several commands in Brocade Fabric OS before Brocade Fabric OS v.9.0.1e, and v9.1.0 use unsafe string functions to process user input. Authenticated local attackers could abuse these vulnerabilities to exploit stack-based buffer overflows, allowing arbitrary code execution as the root user account.
Configurations

Configuration 1 (hide)

cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:07

Type Values Removed Values Added
References () https://security.netapp.com/advisory/ntap-20230127-0010/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230127-0010/ - Third Party Advisory
References () https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2078 - Vendor Advisory () https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2078 - Vendor Advisory

Information

Published : 2022-10-25 21:15

Updated : 2024-11-21 07:07


NVD link : CVE-2022-33185

Mitre link : CVE-2022-33185

CVE.ORG link : CVE-2022-33185


JSON object : View

Products Affected

broadcom

  • fabric_operating_system
CWE
CWE-787

Out-of-bounds Write