Cyber Posture

CVE-2025-58383

High

Published: 03 February 2026

Published
03 February 2026
Modified
06 February 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 9.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-58383 is a high-severity Execution with Unnecessary Privileges (CWE-250) vulnerability in Broadcom Fabric Operating System. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 9.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-250

Policy promotes least privilege by defining necessary privileges and management commitment to them.

addresses: CWE-250

Supervision detects and allows removal of unnecessary privileges that enable execution with excess rights.

addresses: CWE-250

Reviewing accounts for compliance, disabling/removing unneeded accounts, and aligning with termination processes prevents execution with unnecessary privileges.

addresses: CWE-250

Separation of duties prevents any single user from holding all privileges needed to complete a critical task, directly reducing execution with unnecessary privileges.

addresses: CWE-250

Directly prevents execution with more privileges than needed for assigned tasks.

addresses: CWE-250

Role-based training on least privilege principles reduces the chance personnel assign or retain unnecessary privileges.

addresses: CWE-250

Analysis of audit records can identify execution with unnecessary privileges through unusual activity patterns.

addresses: CWE-250

Automatic termination after a defined period eliminates unnecessary privileges from persistent connections.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Direct privilege escalation via exploitation of unnecessary privileges (CWE-250) allowing bypass of controls for arbitrary command execution by an authenticated admin user.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability in Brocade Fabric OS versions before 9.2.1c2 could allow an administrator-level user to execute the bind command, to escalate privileges and bypass security controls allowing the execution of arbitrary commands.

Deeper analysisAI

CVE-2025-58383 is a privilege escalation vulnerability in Brocade Fabric OS versions before 9.2.1c2. It enables an administrator-level user to execute the bind command, bypassing security controls and allowing the execution of arbitrary commands. The issue has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and is classified under CWE-250 (Execution with Unnecessary Privileges).

An administrator-level user can exploit this vulnerability remotely over the network with low attack complexity and no user interaction. Exploitation grants escalated privileges, enabling arbitrary command execution with high impacts to confidentiality, integrity, and availability.

The Broadcom security advisory at https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36878 provides details on mitigation, including upgrading to Brocade Fabric OS version 9.2.1c2 or later.

Details

CWE(s)

Affected Products

broadcom
fabric operating system
≤ 9.2.1c2 · 9.2.2 — 9.2.2b

CVEs Like This One

CVE-2025-9711Same product: Broadcom Fabric Operating System
CVE-2025-58382Same product: Broadcom Fabric Operating System
CVE-2026-0383Same product: Broadcom Fabric Operating System
CVE-2024-5462Same product: Broadcom Fabric Operating System
CVE-2024-5461Same product: Broadcom Fabric Operating System
CVE-2024-2240Same vendor: Broadcom
CVE-2026-0870Shared CWE-250
CVE-2026-0869Same vendor: Broadcom
CVE-2024-48013Shared CWE-250
CVE-2025-57119Shared CWE-250

References