A vulnerability in fab_seg.c.h libraries of all Brocade Fabric OS versions before Brocade Fabric OS v9.1.1, v9.0.1e, v8.2.3c, v8.2.0_cbn5, 7.4.2j could allow local authenticated attackers to exploit stack-based buffer overflows and execute arbitrary code as the root user account.
References
| Link | Resource |
|---|---|
| https://security.netapp.com/advisory/ntap-20230127-0009/ | Third Party Advisory |
| https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2080 | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20230127-0009/ | Third Party Advisory |
| https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2080 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:07
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://security.netapp.com/advisory/ntap-20230127-0009/ - Third Party Advisory | |
| References | () https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2080 - Vendor Advisory |
Information
Published : 2022-10-25 21:15
Updated : 2025-05-07 14:15
NVD link : CVE-2022-33184
Mitre link : CVE-2022-33184
CVE.ORG link : CVE-2022-33184
JSON object : View
Products Affected
broadcom
- fabric_operating_system
CWE
CWE-787
Out-of-bounds Write
