Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9711: CWE-272: Least Privilege Violation in Brocade Fabric OS

0
High
VulnerabilityCVE-2025-9711cvecve-2025-9711cwe-272
Published: Tue Feb 03 2026 (02/03/2026, 05:19:25 UTC)
Source: CVE Database V5
Vendor/Project: Brocade
Product: Fabric OS

Description

CVE-2025-9711 is a high-severity privilege escalation vulnerability in Brocade Fabric OS versions before 9. 2. 1c3 and between 9. 2. 2 and 9. 2. 2b. It allows a local authenticated user with limited privileges to escalate to root by exploiting the export option in the seccertmgmt and seccryptocfg commands. No user interaction or additional authentication is required beyond local access. The vulnerability violates the principle of least privilege, potentially compromising confidentiality, integrity, and availability of affected systems.

AI-Powered Analysis

AILast updated: 02/03/2026, 05:59:46 UTC

Technical Analysis

CVE-2025-9711 is a vulnerability classified under CWE-272 (Least Privilege Violation) affecting Brocade Fabric OS, a specialized operating system used in Fibre Channel storage area network (SAN) switches. The flaw exists in versions prior to 9.2.1c3 and in versions 9.2.2 through 9.2.2b. It allows a local authenticated user with limited privileges to escalate their privileges to root by exploiting the export option in two administrative commands: seccertmgmt and seccryptocfg. These commands are typically used for security certificate management and cryptographic configuration, respectively. The vulnerability arises because these commands do not properly enforce privilege checks when exporting security credentials or cryptographic settings, enabling privilege escalation without requiring additional authentication or user interaction. The CVSS 4.0 vector indicates the attack requires local access (AV:L), low attack complexity (AC:L), no privileges required beyond local user (PR:L), no user interaction (UI:N), but results in high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). This means an attacker who gains local access can fully compromise the system, potentially leading to unauthorized data access, manipulation, or denial of service. No public exploits have been reported yet, but the vulnerability's nature and impact make it a critical concern for organizations relying on Brocade Fabric OS for their storage networking infrastructure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security and stability of storage area networks that use Brocade Fabric OS. Exploitation could lead to full system compromise of SAN switches, allowing attackers to manipulate or disrupt storage traffic, access sensitive data, or cause denial of service conditions affecting critical business applications. This is particularly impactful for sectors with high data sensitivity and availability requirements, such as finance, healthcare, telecommunications, and government. The ability to escalate privileges locally means that insider threats or attackers who gain initial limited access could leverage this vulnerability to gain full control, bypassing existing security controls. The disruption or compromise of storage infrastructure could result in data breaches, operational downtime, and regulatory compliance violations under GDPR and other European data protection laws.

Mitigation Recommendations

To mitigate CVE-2025-9711, organizations should immediately upgrade Brocade Fabric OS to version 9.2.1c3 or later, where the vulnerability is patched. Until upgrades can be applied, restrict local access to Brocade devices to trusted administrators only, using strong authentication and access control mechanisms. Implement network segmentation to limit access to management interfaces and monitor logs for unusual usage of seccertmgmt and seccryptocfg commands. Employ strict change management and auditing to detect unauthorized privilege escalations. Additionally, consider deploying endpoint detection and response (EDR) solutions on management workstations to detect suspicious activities related to Brocade device administration. Regularly review and update security policies to enforce least privilege principles and ensure that only necessary personnel have local access to critical infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
brocade
Date Reserved
2025-08-29T21:05:15.571Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69818b64f9fa50a62fa73b85

Added to database: 2/3/2026, 5:45:08 AM

Last enriched: 2/3/2026, 5:59:46 AM

Last updated: 2/3/2026, 8:00:51 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats