CVE-2026-0383
Published: 03 February 2026
Summary
CVE-2026-0383 is a high-severity OS Command Injection (CWE-78) vulnerability in Broadcom Fabric Operating System. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Shell History (T1552.003); ranked at the 1.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AU-9 (Protection of Audit Information).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Protects audit information such as bash history command files from unauthorized access by authenticated local privileged attackers.
Enforces logical access controls to prevent privileged local attackers from reading insecurely stored sensitive file contents via the Bash shell.
Restricts privileges for Bash shell access to the minimum necessary, limiting the ability of local users to exploit insecure file storage.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directly enables reading of Bash shell history and other insecure local files containing credentials/secrets via local authenticated access and OS command injection.
NVD Description
A vulnerability in Brocade Fabric OS could allow an authenticated, local attacker with privileges to access the Bash shell to access insecurely stored file contents including the history command.
Deeper analysisAI
CVE-2026-0383 is a vulnerability in Brocade Fabric OS that enables an authenticated local attacker with privileges to access the Bash shell to read insecurely stored file contents, including those from the history command. Classified under CWE-78 (OS Command Injection), it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability with low attack complexity and privileges required.
An authenticated local attacker possessing privileges to access the Bash shell can exploit this issue to retrieve sensitive file contents that are stored insecurely, such as command history logs. This could expose historical commands executed by administrators or other users, potentially revealing credentials, configuration details, or other operational secrets on the affected Fabric OS system.
The Broadcom security advisory at https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36851 provides details on mitigation steps and available patches for this vulnerability in Brocade Fabric OS. Security practitioners should consult this reference for version-specific remediation guidance.
Details
- CWE(s)