Cyber Posture

CVE-2025-58382

High

Published: 03 February 2026

Published
03 February 2026
Modified
06 February 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 26.1th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-58382 is a high-severity Authentication Bypass by Primary Weakness (CWE-305) vulnerability in Broadcom Fabric Operating System. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 26.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Vuln directly enables authenticated admin to escalate to root via arbitrary command execution on Unix-like Fabric OS.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability in the secure configuration of authentication and management services in Brocade Fabric OS before Fabric OS 9.2.1c2 could allow an authenticated, remote attacker with administrative credentials to execute arbitrary commands as root using “supportsave”, “seccertmgmt”, “configupload” command.

Deeper analysisAI

CVE-2025-58382 is a vulnerability in the secure configuration of authentication and management services within Brocade Fabric OS versions prior to 9.2.1c2. It stems from improper handling that enables an authenticated, remote attacker possessing administrative credentials to execute arbitrary commands with root privileges. The issue is classified under CWE-305 (Incorrect Inheritance of Permissions) and carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts.

An attacker requires valid administrative credentials and remote network access to the affected Fabric OS management interface to exploit this flaw. By leveraging specific commands such as "supportsave", "seccertmgmt", or "configupload", the attacker can escalate privileges and run arbitrary code as root, potentially leading to full system compromise, data exfiltration, or persistent access within the storage fabric environment.

Broadcom has published a security advisory addressing this vulnerability, available at https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36849, which details the issue and recommends upgrading to Fabric OS 9.2.1c2 or later to mitigate the risk.

Details

CWE(s)

Affected Products

broadcom
fabric operating system
≤ 9.2.1c2 · 9.2.2 — 9.2.2b

CVEs Like This One

CVE-2025-58383Same product: Broadcom Fabric Operating System
CVE-2025-9711Same product: Broadcom Fabric Operating System
CVE-2026-0383Same product: Broadcom Fabric Operating System
CVE-2024-5462Same product: Broadcom Fabric Operating System
CVE-2026-0869Same vendor: Broadcom
CVE-2024-5461Same product: Broadcom Fabric Operating System
CVE-2024-2240Same vendor: Broadcom
CVE-2024-4282Same vendor: Broadcom
CVE-2024-1509Same vendor: Broadcom
CVE-2025-12774Same vendor: Broadcom

References