Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58380: CWE-35: Path Traversal in Brocade Fabric OS

0
Medium
VulnerabilityCVE-2025-58380cvecve-2025-58380cwe-35
Published: Tue Feb 03 2026 (02/03/2026, 05:05:49 UTC)
Source: CVE Database V5
Vendor/Project: Brocade
Product: Fabric OS

Description

CVE-2025-58380 is a medium severity path traversal vulnerability in Brocade Fabric OS versions before 9. 2. 1. It allows an authenticated attacker with administrative privileges to exploit the shell command 'grep' to manipulate path variables and traverse directories outside intended boundaries. This vulnerability requires high privileges and no user interaction, limiting its exploitation scope. Although no known exploits are reported in the wild, successful exploitation could lead to unauthorized access or modification of sensitive files within the system. European organizations using Brocade Fabric OS in their storage area networks (SANs) could face risks to data confidentiality and integrity. Mitigation involves upgrading to Fabric OS 9. 2. 1 or later and restricting administrative shell access.

AI-Powered Analysis

AILast updated: 02/10/2026, 10:57:48 UTC

Technical Analysis

CVE-2025-58380 is a path traversal vulnerability identified in Brocade Fabric OS versions prior to 9.2.1. The flaw stems from improper handling of path variables when using the shell command 'grep' by an authenticated user with administrative privileges. Specifically, an attacker with admin rights can manipulate the environment or command parameters to traverse directories upwards or access unintended directories, violating the intended filesystem access boundaries. This vulnerability is classified under CWE-35 (Path Traversal) and does not require user interaction but does require high-level privileges, limiting the attack vector to insiders or compromised admin accounts. The CVSS v4.0 score is 4.6 (medium severity), reflecting the limited attack vector (local), low impact on confidentiality, and no impact on integrity or availability beyond the scope of path traversal. Although no public exploits are currently known, the potential for unauthorized access to sensitive configuration or system files exists, which could facilitate further attacks or system misconfigurations. Brocade Fabric OS is widely used in SAN environments for enterprise storage networking, making this vulnerability relevant for organizations relying on these infrastructures. The lack of a patch link suggests that remediation involves upgrading to Fabric OS 9.2.1 or later, where this issue is resolved.

Potential Impact

For European organizations, the impact primarily concerns the confidentiality and integrity of storage network configurations and potentially sensitive files accessible via the Fabric OS shell. Exploitation could allow attackers with admin credentials to access or modify files outside intended directories, potentially exposing sensitive data or enabling further compromise of the storage environment. This could disrupt storage operations or lead to data breaches, especially in sectors with critical data such as finance, healthcare, and government. Given the requirement for administrative privileges, the risk is heightened by insider threats or compromised admin accounts. The medium severity rating indicates that while the vulnerability is not trivial, it is not easily exploitable remotely or by low-privilege users, somewhat limiting its impact scope. However, the strategic importance of storage infrastructure in European data centers means any compromise could have significant operational and reputational consequences.

Mitigation Recommendations

The primary mitigation is to upgrade Brocade Fabric OS to version 9.2.1 or later, where this path traversal vulnerability is fixed. Until the upgrade can be performed, organizations should strictly control and monitor administrative access to the Fabric OS shell, employing strong authentication and access logging. Limiting the number of users with admin privileges and enforcing the principle of least privilege reduces the attack surface. Additionally, organizations should audit existing Fabric OS environments for unusual directory access patterns or shell command usage that could indicate exploitation attempts. Network segmentation of management interfaces and use of multi-factor authentication for admin accounts further reduce risk. Regularly reviewing and updating security policies around SAN management and ensuring timely application of vendor security advisories are also critical.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
brocade
Date Reserved
2025-08-29T21:03:16.424Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69818461f9fa50a62fa607ba

Added to database: 2/3/2026, 5:15:13 AM

Last enriched: 2/10/2026, 10:57:48 AM

Last updated: 3/20/2026, 7:34:58 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses