Skip to main content

CVE-2025-4661: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Brocade Fabric OS

Medium
VulnerabilityCVE-2025-4661cvecve-2025-4661cwe-22
Published: Thu Jun 19 2025 (06/19/2025, 02:27:04 UTC)
Source: CVE Database V5
Vendor/Project: Brocade
Product: Fabric OS

Description

A path transversal vulnerability in Brocade Fabric OS 9.1.0 through 9.2.2 could allow a local admin user to gain access to files outside the intended directory potentially leading to the disclosure of sensitive information. Note: Admin level privilege is required on the switch in order to exploit

AI-Powered Analysis

AILast updated: 06/19/2025, 02:47:06 UTC

Technical Analysis

CVE-2025-4661 is a path traversal vulnerability identified in Brocade Fabric OS versions 9.1.0 through 9.2.2. This vulnerability arises due to improper limitation of a pathname to a restricted directory (CWE-22), allowing a local administrator on the affected switch to access files outside the intended directory scope. The flaw specifically affects the Brocade Fabric OS, which is a specialized operating system used in Brocade Fibre Channel switches, commonly deployed in storage area networks (SANs). Exploitation requires administrative privileges on the switch, meaning an attacker must already have high-level access to the device. The vulnerability does not require user interaction and has a CVSS 4.8 (medium) score, reflecting that while the attack vector is local and requires high privileges, the impact is limited to potential unauthorized disclosure of sensitive files rather than system compromise or denial of service. There are no known exploits in the wild at this time, and no patches have been linked or published yet. The vulnerability could allow an attacker with admin rights to bypass directory restrictions and read sensitive configuration files or other data stored on the device, potentially exposing credentials, network topology information, or other sensitive operational data. However, the vulnerability does not allow for privilege escalation, remote exploitation, or modification of files, limiting its overall impact.

Potential Impact

For European organizations, particularly those operating large-scale data centers or enterprises with critical storage infrastructure, this vulnerability could lead to unauthorized disclosure of sensitive configuration and operational data within their SAN environments. Since Brocade Fabric OS is widely used in enterprise SAN switches, an attacker with administrative access could leverage this flaw to gain insights into network configurations, potentially aiding further attacks or lateral movement within the network. The impact is primarily confidentiality-related, with limited direct effect on system integrity or availability. However, disclosure of sensitive information could facilitate targeted attacks or compliance violations under GDPR if personal or sensitive data configurations are exposed. Organizations in sectors such as finance, telecommunications, healthcare, and government, which rely heavily on secure storage networks, could be particularly affected. The requirement for admin-level access reduces the risk of external attackers exploiting this vulnerability directly but raises concerns about insider threats or compromised administrative accounts.

Mitigation Recommendations

1. Restrict and tightly control administrative access to Brocade Fabric OS switches, employing strong authentication mechanisms such as multi-factor authentication (MFA) and role-based access controls (RBAC) to minimize the risk of compromised admin credentials. 2. Monitor and audit all administrative activities on Brocade switches to detect unusual or unauthorized access attempts promptly. 3. Segregate management networks for SAN switches from general enterprise networks to reduce exposure to potential attackers. 4. Implement strict file access policies and regularly review configuration files and logs for signs of unauthorized access or tampering. 5. Coordinate with Brocade (or its current vendor) to obtain and apply patches or firmware updates as soon as they become available to remediate this vulnerability. 6. Conduct regular vulnerability assessments and penetration testing focusing on SAN infrastructure to identify and mitigate similar path traversal or privilege misuse issues. 7. Educate administrators on secure handling of credentials and the risks associated with elevated privileges to reduce insider threat risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
brocade
Date Reserved
2025-05-13T18:33:06.354Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6853768c33c7acc046081e21

Added to database: 6/19/2025, 2:31:40 AM

Last enriched: 6/19/2025, 2:47:06 AM

Last updated: 8/14/2025, 10:18:24 PM

Views: 26

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats