Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58382: CWE-305: Authentication Bypass by Primary Weakness in Brocade Fabric OS

0
High
VulnerabilityCVE-2025-58382cvecve-2025-58382cwe-305
Published: Tue Feb 03 2026 (02/03/2026, 01:39:55 UTC)
Source: CVE Database V5
Vendor/Project: Brocade
Product: Fabric OS

Description

A vulnerability in the secure configuration of authentication and management services in Brocade Fabric OS before Fabric OS 9.2.1c2 could allow an authenticated, remote attacker with administrative credentials to execute arbitrary commands as root using “supportsave”, “seccertmgmt”, “configupload” command.

AI-Powered Analysis

AILast updated: 02/27/2026, 07:29:57 UTC

Technical Analysis

CVE-2025-58382 is a vulnerability categorized under CWE-305, indicating an authentication bypass caused by a primary weakness in the secure configuration of authentication and management services within Brocade Fabric OS. This vulnerability affects versions prior to 9.2.1c2 and versions 9.2.2 through 9.2.2a. The flaw allows an attacker who already has authenticated administrative credentials to bypass additional security controls and execute arbitrary commands with root privileges remotely. The commands exploited include 'supportsave', 'seccertmgmt', and 'configupload', which are management utilities typically used for support data collection, security certificate management, and configuration uploads respectively. The CVSS v4.0 score is 8.5, reflecting a high severity due to the ease of exploitation (low attack complexity), no requirement for user interaction, and the potential for full system compromise (high impact on confidentiality, integrity, and availability). The vulnerability does not require exploitation of a network vector without authentication but leverages the existing administrative access to escalate privileges and execute arbitrary commands as root. This can lead to complete control over the affected Brocade Fabric OS devices, which are critical components in storage area networks (SANs) and data center infrastructure. No public exploits have been reported yet, but the risk remains significant given the critical nature of the affected systems and the level of access required.

Potential Impact

The impact of CVE-2025-58382 is substantial for organizations relying on Brocade Fabric OS for their storage networking infrastructure. Successful exploitation allows an attacker with administrative credentials to gain root-level command execution, potentially leading to full compromise of the SAN fabric. This can result in unauthorized data access, data manipulation, disruption of storage services, and potential lateral movement within the data center environment. The confidentiality, integrity, and availability of critical storage resources are at risk, which can affect business continuity, data protection compliance, and operational stability. Given the role of Brocade Fabric OS in enterprise and cloud data centers, the vulnerability could have cascading effects on dependent applications and services. Organizations without proper segmentation or monitoring may find it difficult to detect such escalations, increasing the risk of prolonged undetected compromise.

Mitigation Recommendations

To mitigate CVE-2025-58382, organizations should immediately upgrade Brocade Fabric OS to version 9.2.1c2 or later, or versions beyond 9.2.2a where the vulnerability is resolved. In parallel, restrict administrative access to management interfaces using network segmentation, VPNs, or jump hosts to limit exposure. Implement strict access controls and multi-factor authentication for administrative accounts to reduce the risk of credential compromise. Regularly audit and monitor command usage on Fabric OS devices to detect anomalous activities involving 'supportsave', 'seccertmgmt', and 'configupload' commands. Employ role-based access control (RBAC) to minimize the number of users with high privilege levels. Additionally, maintain up-to-date backups of configuration and critical data to enable recovery in case of compromise. Finally, integrate Fabric OS devices into centralized logging and security information and event management (SIEM) systems to enhance visibility and incident response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
brocade
Date Reserved
2025-08-29T21:03:16.425Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69815a2df9fa50a62f754632

Added to database: 2/3/2026, 2:15:09 AM

Last enriched: 2/27/2026, 7:29:57 AM

Last updated: 3/20/2026, 5:59:57 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses