CVE-2022-33185

Several commands in Brocade Fabric OS before Brocade Fabric OS v.9.0.1e, and v9.1.0 use unsafe string functions to process user input. Authenticated local attackers could abuse these vulnerabilities to exploit stack-based buffer overflows, allowing arbitrary code execution as the root user account.
Configurations

Configuration 1 (hide)

cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*

History

09 May 2025, 19:15

Type Values Removed Values Added
References (MISC) https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2078 - Vendor Advisory () https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2078 - Vendor Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230127-0010/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230127-0010/ - Third Party Advisory

Information

Published : 2022-10-25 21:15

Updated : 2025-05-09 19:15


NVD link : CVE-2022-33185

Mitre link : CVE-2022-33185


JSON object : View

Products Affected

broadcom

  • fabric_operating_system
CWE
CWE-787

Out-of-bounds Write