Vulnerability Details CVE-2021-27792
The request handling functions in web management interface of Brocade Fabric OS versions before v9.0.1a, v8.2.3a, and v7.4.2h do not properly handle malformed user input, resulting in a service crash. An authenticated attacker could use this weakness to cause the FOS HTTP application handler to crash, requiring a reboot.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 15.8%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 7.2
Products affected by CVE-2021-27792
-
cpe:2.3:o:broadcom:fabric_operating_system:-
-
cpe:2.3:o:broadcom:fabric_operating_system:2.1.2
-
cpe:2.3:o:broadcom:fabric_operating_system:2.2
-
cpe:2.3:o:broadcom:fabric_operating_system:3.1
-
cpe:2.3:o:broadcom:fabric_operating_system:5.0.5
-
cpe:2.3:o:broadcom:fabric_operating_system:5.0.5b
-
cpe:2.3:o:broadcom:fabric_operating_system:5.2.0
-
cpe:2.3:o:broadcom:fabric_operating_system:5.2.0a
-
cpe:2.3:o:broadcom:fabric_operating_system:7.3.1d
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.0
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.1
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.1a
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.1b
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.1c
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.1d
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.1e
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2a
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2b
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2c
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2d
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2e
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2f
-
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2g
-
cpe:2.3:o:broadcom:fabric_operating_system:8.0.0
-
cpe:2.3:o:broadcom:fabric_operating_system:8.0.1
-
cpe:2.3:o:broadcom:fabric_operating_system:8.0.1a
-
cpe:2.3:o:broadcom:fabric_operating_system:8.0.1b
-
cpe:2.3:o:broadcom:fabric_operating_system:8.0.2
-
cpe:2.3:o:broadcom:fabric_operating_system:8.0.2a
-
cpe:2.3:o:broadcom:fabric_operating_system:8.0.2b
-
cpe:2.3:o:broadcom:fabric_operating_system:8.0.2c
-
cpe:2.3:o:broadcom:fabric_operating_system:8.0.2d
-
cpe:2.3:o:broadcom:fabric_operating_system:8.0.2f
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.0
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.0a
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.0b
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.0c
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.1
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.1a
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.2
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.2a
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.2b
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.2c
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.2d
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.2e
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.2f
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.2h
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.2j
-
cpe:2.3:o:broadcom:fabric_operating_system:8.1.2k
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.0
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.0a
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1a
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1b
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1c
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1d
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1e
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.2
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.2a
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.2a1
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.2b
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.2c
-
cpe:2.3:o:broadcom:fabric_operating_system:8.2.3
-
cpe:2.3:o:broadcom:fabric_operating_system:9.0.0
-
cpe:2.3:o:broadcom:fabric_operating_system:9.0.0a
-
cpe:2.3:o:broadcom:fabric_operating_system:9.0.0b
-
cpe:2.3:o:broadcom:fabric_operating_system:9.0.1