A privilege escalation vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, could allow a local authenticated user to escalate its privilege to root using switch commands “supportlink”, “firmwaredownload”, “portcfgupload, license, and “fosexec”.
                
            References
                    | Link | Resource | 
|---|---|
| https://security.netapp.com/advisory/ntap-20230127-0007/ | Third Party Advisory | 
| https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2084 | Vendor Advisory | 
| https://security.netapp.com/advisory/ntap-20230127-0007/ | Third Party Advisory | 
| https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2084 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    07 May 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-276 | 
21 Nov 2024, 07:07
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://security.netapp.com/advisory/ntap-20230127-0007/ - Third Party Advisory | |
| References | () https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2084 - Vendor Advisory | 
Information
                Published : 2022-10-25 21:15
Updated : 2025-05-07 14:15
NVD link : CVE-2022-33182
Mitre link : CVE-2022-33182
CVE.ORG link : CVE-2022-33182
JSON object : View
Products Affected
                broadcom
- fabric_operating_system
CWE
                