CVE-2024-5461
Published: 15 February 2025
Summary
CVE-2024-5461 is a high-severity OS Command Injection (CWE-78) vulnerability in Broadcom Fabric Operating System. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Device CLI (T1059.008); ranked at the 31.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the command injection flaw in the SNMP implementation by applying vendor patches as specified in the Broadcom advisory.
Prevents OS command injection by validating and sanitizing SNMP inputs before they are passed to system.sh calls within the SNMP binary.
Restricts or disables unnecessary SNMP operations on the Brocade 6547 embedded switch to eliminate the attack surface for authenticated command injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in SNMP service on network device directly enables remote command execution (T1059.008), privilege escalation to root (T1068), and exploitation of the remote management service (T1210).
NVD Description
Implementation of the Simple Network Management Protocol (SNMP) operating on the Brocade 6547 (FC5022) embedded switch blade, makes internal script calls to system.sh from within the SNMP binary. An authenticated attacker could perform command or parameter injection on SNMP operations…
more
that are only enabled on the Brocade 6547 (FC5022) embedded switch. This injection could allow the authenticated attacker to issue commands as Root.
Deeper analysisAI
CVE-2024-5461 is a command or parameter injection vulnerability in the implementation of the Simple Network Management Protocol (SNMP) on the Brocade 6547 (FC5022) embedded switch blade. The SNMP binary makes internal script calls to system.sh, enabling injection flaws specifically in SNMP operations that are only enabled on this embedded switch. This issue, classified under CWE-78 (OS Command Injection), carries a CVSS v3.1 base score of 8.0 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
An authenticated attacker with low privileges, positioned on an adjacent network, can exploit this vulnerability with low complexity and no user interaction required. By targeting SNMP operations on the Brocade 6547 (FC5022) embedded switch, the attacker can inject commands or parameters into the system.sh calls, ultimately executing arbitrary commands with root privileges. This grants high confidentiality, integrity, and availability impacts, potentially leading to full system compromise.
Mitigation details are available in the Broadcom security advisory at https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24411. Security practitioners should consult this reference for patching instructions and workarounds specific to affected Brocade devices.
Details
- CWE(s)