Sunday, May 18, 2025
HomeCVE/vulnerabilityCISA Adds Broadcom Brocade Fabric OS Flaw to Known Exploited Vulnerabilities List

CISA Adds Broadcom Brocade Fabric OS Flaw to Known Exploited Vulnerabilities List

Published on

SIEM as a Service

Follow Us on Google News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent security advisory after adding a critical Broadcom Brocade Fabric OS vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog.

The flaw, tracked as CVE-2025-1976, affects Broadcom’s widely deployed Brocade Fabric OS and has drawn increased concern from government and enterprise security teams due to its potential impact.

CVE-2025-1976: Overview and Technical Details

CVE-2025-1976 describes a code injection vulnerability in Broadcom Brocade Fabric OS.

- Advertisement - Google News

According to Broadcom and CISA, this flaw allows a local user with administrative privileges to inject and execute arbitrary code with full root privileges.

The vulnerability is classified under the Common Weakness Enumeration as CWE-94: Improper Control of Generation of Code (‘Code Injection’), highlighting the risk of attackers gaining complete control over affected systems.

While there is currently no public evidence that this vulnerability is being actively used in ransomware or other cyberattack campaigns, CISA stresses the importance of immediate remediation.

The agency warns that vulnerabilities with characteristics like CVE-2025-1976 – particularly those granting root-level access, are often rapidly adopted by threat actors once disclosed.

Broadcom Brocade Fabric OS is a foundational component in many data centers, underpinning the management of storage area networks (SANs) for global enterprises and critical infrastructure sectors.

A successful exploitation of this vulnerability could allow an attacker to modify network configurations, disrupt operations, or exfiltrate sensitive data.

Given that the attack requires administrative access, CISA notes that organizations with robust access controls are at lower risk, but attackers may leverage stolen credentials or exploit other vulnerabilities to reach the necessary privilege level.

CISA advises organizations to apply mitigations per vendor instructions without delay. Broadcom has released guidance for security teams to address the vulnerability.

In cases where mitigations are unavailable or cannot be applied, CISA recommends discontinuing the use of vulnerable versions of the product.

Additionally, federal agencies are instructed to follow the procedures outlined in Binding Operational Directive 22-01 (BOD 22-01) for cloud services and network security, ensuring swift action. The deadline for compliance is May 19, 2025.

CISA will continue to monitor the threat landscape for any evidence of exploitation, especially in ransomware operations.

The agency recommends all organizations, especially those in critical infrastructure, audit their systems for affected versions and prioritize timely patching.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...