CVE-2026-0383

N/A Unknown

📋 TL;DR

This vulnerability in Brocade Fabric OS allows authenticated local attackers with Bash shell access to read insecurely stored file contents, including command history. This affects Brocade SAN switch administrators who have shell access privileges. The vulnerability could expose sensitive information from improperly secured files.

💻 Affected Systems

Products:
  • Brocade Fabric OS
Versions: Specific versions not specified in advisory - check Broadcom advisory for details
Operating Systems: Fabric OS (proprietary)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated local access with privileges to access Bash shell. Affects systems where file permissions are improperly configured.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive configuration files, credentials, or other protected data stored insecurely, potentially leading to full system compromise or data exfiltration.

🟠

Likely Case

Privileged users could inadvertently expose sensitive information through command history or access files containing configuration details that should be protected.

🟢

If Mitigated

With proper access controls and file permissions, the impact is limited to non-sensitive information and command history visibility.

🌐 Internet-Facing: LOW - This requires local authenticated access with specific privileges, making remote exploitation unlikely.
🏢 Internal Only: MEDIUM - Internal privileged users could exploit this to access sensitive information they shouldn't have access to.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple file access once authenticated with appropriate privileges

Exploitation requires existing authenticated access with shell privileges. No special tools needed beyond standard shell access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Broadcom advisory for specific fixed versions

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36851

Restart Required: Yes

Instructions:

1. Review Broadcom advisory for affected versions. 2. Download appropriate patch from Broadcom support. 3. Apply patch following vendor instructions. 4. Restart affected systems as required.

🔧 Temporary Workarounds

Restrict shell access

all

Limit Bash shell access to only necessary administrative users

# Configure user permissions to restrict shell access
# Use Fabric OS user management commands

Secure file permissions

all

Review and tighten file permissions on sensitive files

# Review file permissions on sensitive configuration files
# Use appropriate chmod commands to restrict access

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access Bash shell
  • Regularly audit file permissions and remove unnecessary sensitive information from accessible locations

🔍 How to Verify

Check if Vulnerable:

Check if you have Brocade Fabric OS and if users with shell access can read files they shouldn't have access to

Check Version:

versionShow (Fabric OS command)

Verify Fix Applied:

Verify patch installation through version check and test that previously accessible sensitive files are now properly protected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns by privileged users
  • Multiple failed permission checks

Network Indicators:

  • N/A - local vulnerability

SIEM Query:

Search for file access events on sensitive paths by users with shell privileges

🔗 References

📤 Share This