Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58379: CWE-250 Execution with Unnecessary Privileges in Brocade Fabric OS

0
Medium
VulnerabilityCVE-2025-58379cvecve-2025-58379cwe-250
Published: Tue Feb 03 2026 (02/03/2026, 01:55:09 UTC)
Source: CVE Database V5
Vendor/Project: Brocade
Product: Fabric OS

Description

CVE-2025-58379 is a medium-severity vulnerability in Brocade Fabric OS versions prior to 9. 2. 1 that allows a local authenticated attacker with low privileges to execute commands exposing higher privilege command line passwords. This flaw arises from execution with unnecessary privileges (CWE-250), enabling privilege leakage without requiring network access or elevated authentication. Exploitation requires user interaction and local access but can lead to significant confidentiality breaches within storage network environments. No known exploits are currently reported in the wild. European organizations using Brocade Fabric OS in their SAN infrastructure could face risks of credential exposure, potentially leading to further lateral movement or unauthorized access. Mitigation involves upgrading to Fabric OS 9. 2. 1 or later and restricting local user access to management interfaces.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 11:04:59 UTC

Technical Analysis

CVE-2025-58379 is a vulnerability identified in Brocade Fabric OS, a specialized operating system used in storage area network (SAN) switches. The flaw is categorized under CWE-250, which involves execution with unnecessary privileges. Specifically, in versions prior to 9.2.1, a local attacker with authenticated access but low privileges can execute certain commands that inadvertently expose command line passwords or other sensitive information associated with higher privilege accounts. This occurs because the system does not adequately restrict the privilege level required to run these commands, leading to privilege leakage. The vulnerability requires local access and user interaction, meaning an attacker must already have some level of access to the device and execute commands to exploit it. The CVSS 4.0 base score is 6.0 (medium severity), reflecting the moderate impact on confidentiality and the limited attack vector (local). The vulnerability does not affect integrity or availability directly but compromises confidentiality by revealing sensitive credentials. No public exploits or active exploitation have been reported to date. The absence of patch links suggests that remediation is available through upgrading to Fabric OS version 9.2.1 or later, where the privilege checks have been corrected. This vulnerability is particularly relevant for organizations relying on Brocade SAN switches for critical storage infrastructure, as credential exposure could facilitate further unauthorized access or lateral movement within the network.

Potential Impact

For European organizations, the primary impact of CVE-2025-58379 is the potential exposure of sensitive command line passwords used in Brocade Fabric OS environments. This can lead to unauthorized access to SAN switches, which are critical components in enterprise storage networks. Compromise of these devices could allow attackers to intercept, manipulate, or disrupt storage traffic, potentially affecting data confidentiality and availability indirectly. Given the local authentication requirement, the threat is more significant in environments where multiple users have local access to management interfaces or where insider threats exist. Organizations with large data centers, cloud providers, and enterprises using Brocade SAN infrastructure in Europe could face increased risk of credential theft, leading to broader network compromise. The impact is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government. However, since exploitation requires local access and user interaction, remote attackers or external threat actors have limited direct risk unless they first gain internal foothold.

Mitigation Recommendations

To mitigate CVE-2025-58379, European organizations should prioritize upgrading Brocade Fabric OS to version 9.2.1 or later, where the vulnerability has been addressed. Until upgrades can be applied, restrict local access to SAN switches by enforcing strict access control policies and limiting the number of users with authenticated local access. Implement role-based access controls (RBAC) to ensure users operate with the minimum privileges necessary, preventing low-privileged users from executing commands that expose sensitive information. Monitor and audit command execution logs on Fabric OS devices to detect unusual or unauthorized command usage. Additionally, consider network segmentation to isolate SAN management interfaces from general user networks, reducing the risk of unauthorized local access. Educate administrators and users about the risks of credential exposure and enforce strong password policies. Finally, maintain up-to-date incident response plans that include procedures for SAN infrastructure compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
brocade
Date Reserved
2025-08-29T21:03:16.424Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69815a2df9fa50a62f75462f

Added to database: 2/3/2026, 2:15:09 AM

Last enriched: 2/10/2026, 11:04:59 AM

Last updated: 3/24/2026, 1:18:40 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses