8.1
CVE-2021-27795
- EPSS 0.04%
- Veröffentlicht 06.12.2023 02:15:06
- Zuletzt bearbeitet 21.11.2024 05:58:34
- Quelle sirt@brocade.com
- CVE-Watchlists
- Unerledigt
License forgery in Brocade Fabric OS (FOS) hardware platforms running any version of Brocade Fabric OS software,
Brocade Fabric OS (FOS) hardware platforms running any version of Brocade Fabric OS software, which supports the license string format; contain cryptographic issues that could allow for the installation of forged or fraudulent license keys. This would allow attackers or a malicious party to forge a counterfeit license key that the Brocade Fabric OS platform would authenticate and activate as if it were a legitimate license key.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Broadcom ≫ Fabric Operating System
Broadcom ≫ Brocade 300 Version-
Broadcom ≫ Brocade 610 Version-
Broadcom ≫ Brocade 6505 Version-
Broadcom ≫ Brocade 6510 Version-
Broadcom ≫ Brocade 6520 Version-
Broadcom ≫ Brocade 7800 Version-
Broadcom ≫ Brocade 7810 Version-
Broadcom ≫ Brocade 7840 Version-
Broadcom ≫ Brocade G620 Version-
Broadcom ≫ Brocade G630 Version-
Broadcom ≫ Brocade X6-4 Director Version-
Broadcom ≫ Brocade X6-8 Director Version-
Broadcom ≫ Brocade 610 Version-
Broadcom ≫ Brocade 6505 Version-
Broadcom ≫ Brocade 6510 Version-
Broadcom ≫ Brocade 6520 Version-
Broadcom ≫ Brocade 7800 Version-
Broadcom ≫ Brocade 7810 Version-
Broadcom ≫ Brocade 7840 Version-
Broadcom ≫ Brocade G620 Version-
Broadcom ≫ Brocade G630 Version-
Broadcom ≫ Brocade X6-4 Director Version-
Broadcom ≫ Brocade X6-8 Director Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.115 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| sirt@brocade.com | 6.4 | 1.6 | 4.7 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
|
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.