Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58381: CWE-35: Path Traversal in Brocade Fabric OS

0
Medium
VulnerabilityCVE-2025-58381cvecve-2025-58381cwe-35
Published: Tue Feb 03 2026 (02/03/2026, 05:40:14 UTC)
Source: CVE Database V5
Vendor/Project: Brocade
Product: Fabric OS

Description

CVE-2025-58381 is a medium-severity path traversal vulnerability in Brocade Fabric OS versions before 9. 2. 1c2. It allows an authenticated attacker with administrative privileges to manipulate shell command path variables and traverse directories beyond intended boundaries. Exploitation requires admin-level access but no user interaction. The vulnerability could lead to unauthorized access or modification of files outside the permitted directory structure, potentially impacting system integrity. No known exploits are currently reported in the wild. The CVSS score is 4. 6, reflecting limited attack vector scope and required privileges. European organizations using affected Brocade Fabric OS versions in their storage area networks (SANs) could face risks to critical infrastructure.

AI-Powered Analysis

AILast updated: 02/03/2026, 06:14:26 UTC

Technical Analysis

CVE-2025-58381 is a path traversal vulnerability identified in Brocade Fabric OS, a specialized operating system used primarily in storage area network (SAN) switches. The flaw exists in versions prior to 9.2.1c2 and arises from improper handling of shell command path variables when executing commands such as 'source', 'ping6', 'sleep', 'disown', and 'wait'. An attacker with authenticated administrative privileges can exploit this vulnerability by manipulating these shell commands to modify path variables, enabling traversal to parent or arbitrary directories outside the intended filesystem scope. This can lead to unauthorized access or modification of files and directories that should be protected, potentially undermining system integrity and confidentiality. The vulnerability requires local admin privileges, no user interaction, and has a limited attack vector (local access). The CVSS 4.6 score reflects these factors, indicating a medium severity. No public exploits or active exploitation have been reported to date. The vulnerability is classified under CWE-35 (Path Traversal), highlighting the risk of attackers bypassing directory restrictions. Brocade Fabric OS is widely deployed in enterprise SAN environments, making this vulnerability relevant to organizations relying on these storage infrastructures.

Potential Impact

For European organizations, the impact of CVE-2025-58381 could be significant in environments where Brocade Fabric OS is deployed to manage critical storage networks. Successful exploitation could allow attackers with admin access to access or modify sensitive configuration files or data stored on SAN devices, potentially leading to data integrity issues, unauthorized data disclosure, or disruption of storage services. This could affect sectors reliant on high-availability storage such as finance, healthcare, telecommunications, and government. Although exploitation requires administrative credentials, insider threats or compromised admin accounts could leverage this vulnerability to escalate their access or bypass security controls. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in critical infrastructure warrants prompt attention. The medium CVSS score suggests moderate risk but should not be underestimated given the criticality of storage systems in enterprise operations.

Mitigation Recommendations

To mitigate CVE-2025-58381, organizations should prioritize upgrading Brocade Fabric OS to version 9.2.1c2 or later, where the vulnerability is addressed. Until patching is possible, restrict administrative shell access to trusted personnel only and enforce strict credential management policies to prevent unauthorized admin access. Implement monitoring and logging of admin shell command usage to detect suspicious path manipulation attempts. Employ network segmentation to limit access to SAN management interfaces and use multi-factor authentication for admin accounts to reduce the risk of credential compromise. Regularly audit Fabric OS configurations and access controls to ensure adherence to security best practices. Additionally, consider deploying host-based intrusion detection systems on management workstations to detect anomalous command execution patterns related to path traversal attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
brocade
Date Reserved
2025-08-29T21:03:16.424Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69818ee8f9fa50a62fa7da8d

Added to database: 2/3/2026, 6:00:08 AM

Last enriched: 2/3/2026, 6:14:26 AM

Last updated: 2/3/2026, 7:07:48 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats