ID CVE-2017-6227
Summary A vulnerability in the IPv6 stack on Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) versions before 7.4.2b, 8.1.2 and 8.2.0 could allow an attacker to cause a denial of service (CPU consumption and device hang) condition by sending crafted Router Advertisement (RA) messages to a targeted system.
References
Vulnerable Configurations
  • cpe:2.3:o:broadcom:fabric_operating_system:8.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:8.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:8.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:8.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:2.2:*:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:3.1:*:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:5.0.5:b:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:5.0.5:b:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:5.2.0:-:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:5.2.0:-:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:5.2.0:a:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:5.2.0:a:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.0:-:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.0:-:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:-:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:-:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:a:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:a:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:b:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:b:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:c:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:c:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:d:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:d:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:e:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:e:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:-:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:-:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:a:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:a:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:b:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:b:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:c:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:c:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:d:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:d:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:f:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:f:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:g:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:g:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:8.1.0:*:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:8.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:8.0.2:*:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:8.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:brocade:fabric_os:8.0.2b2:*:*:*:*:*:*:*
    cpe:2.3:o:brocade:fabric_os:8.0.2b2:*:*:*:*:*:*:*
  • cpe:2.3:o:broadcom:fabric_operating_system:8.1.2:*:*:*:*:*:*:*
    cpe:2.3:o:broadcom:fabric_operating_system:8.1.2:*:*:*:*:*:*:*
CVSS
Base: 6.1 (as of 22-06-2021 - 15:20)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
ADJACENT_NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:A/AC:L/Au:N/C:N/I:N/A:C
refmap via4
confirm https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-526
Last major update 22-06-2021 - 15:20
Published 08-02-2018 - 22:29
Last modified 22-06-2021 - 15:20
Back to Top