Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9711: CWE-272: Least Privilege Violation in Brocade Fabric OS

0
High
VulnerabilityCVE-2025-9711cvecve-2025-9711cwe-272
Published: Tue Feb 03 2026 (02/03/2026, 05:19:25 UTC)
Source: CVE Database V5
Vendor/Project: Brocade
Product: Fabric OS

Description

A vulnerability in Brocade Fabric OS before 9.2.1c3 could allow elevating the privileges of the local authenticated user to “root” using the export option of seccertmgmt and seccryptocfg commands.

AI-Powered Analysis

AILast updated: 02/27/2026, 07:38:51 UTC

Technical Analysis

CVE-2025-9711 is a vulnerability identified in Brocade Fabric OS, a specialized operating system used in Fibre Channel storage area network (SAN) switches. The flaw exists in versions prior to 9.2.1c3 and between 9.2.2 and 9.2.2b. It involves a least privilege violation (CWE-272) where local authenticated users with limited privileges can leverage the export functionality of the seccertmgmt and seccryptocfg commands to escalate their privileges to root level. These commands are typically used for security certificate management and cryptographic configuration within the Fabric OS environment. The vulnerability does not require additional authentication or user interaction beyond having local access, making it easier to exploit if an attacker gains initial foothold. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects that the attack requires local access but has low complexity and no user interaction, with high impact on confidentiality, integrity, and availability. Exploiting this vulnerability could allow attackers to fully control the SAN switch, potentially compromising the entire storage fabric. No public exploits or patches have been reported yet, but the risk is substantial given the critical role of Brocade Fabric OS in enterprise storage networks.

Potential Impact

The impact of CVE-2025-9711 is significant for organizations relying on Brocade Fabric OS for their storage area networks. Successful exploitation grants root-level access to an attacker who already has local authenticated access, enabling full control over the SAN switch. This can lead to unauthorized data access, manipulation, or disruption of storage services, severely affecting data confidentiality, integrity, and availability. Given the central role of SAN switches in enterprise data centers, this could result in widespread operational disruption, data breaches, and potential loss of critical business data. The vulnerability also increases the risk of lateral movement within the network, as compromised SAN infrastructure can be used to pivot to other critical systems. Industries with high dependence on storage networks, such as financial services, healthcare, cloud providers, and large enterprises, face elevated risks. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-9711, organizations should immediately identify and inventory all Brocade Fabric OS devices running affected versions. Since no patches are currently available, administrators should restrict local access to trusted personnel only and implement strict access controls and monitoring on management interfaces. Disable or restrict usage of the seccertmgmt and seccryptocfg commands' export options if possible, or audit their usage closely. Employ network segmentation to isolate SAN management interfaces from general user networks to reduce the risk of unauthorized local access. Implement robust logging and alerting to detect any unusual privilege escalation attempts. Additionally, plan for rapid deployment of vendor patches once released and consider temporary compensating controls such as multi-factor authentication for local access or enhanced session monitoring. Regularly review and update security policies governing SAN device management to minimize exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
brocade
Date Reserved
2025-08-29T21:05:15.571Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69818b64f9fa50a62fa73b85

Added to database: 2/3/2026, 5:45:08 AM

Last enriched: 2/27/2026, 7:38:51 AM

Last updated: 3/19/2026, 9:17:54 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses