Known Vulnerabilities for Fabric Os by Brocade

Listed below are 10 of the newest known vulnerabilities associated with "Fabric Os" by "Brocade".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-32241 Flannel is a network fabric for containers, designed for Kubernetes. The Flannel project includes an experimental Extension b... Not Provided 2026-03-27 2026-03-31
CVE-2020-15376 Brocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in th... 4.3 - MEDIUM 2020-12-11 2021-09-09
CVE-2020-15375 Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validatio... 6.7 - MEDIUM 2020-12-11 2021-06-22
CVE-2020-15374 Rest API in Brocade Fabric OS v8.2.1 through v8.2.1d, and 8.2.2 versions before v8.2.2c is vulnerable to multiple instances o... 9.8 - CRITICAL 2020-09-25 2021-08-23
CVE-2020-15373 Multiple buffer overflow vulnerabilities in REST API in Brocade Fabric OS versions v8.2.1 through v8.2.1d, and 8.2.2 versions... 9.8 - CRITICAL 2020-09-25 2021-08-23
CVE-2020-15372 A vulnerability in the command-line interface in Brocade Fabric OS before Brocade Fabric OS v8.2.2a1, 8.2.2c, v7.4.2g, v8.2.0... 5.5 - MEDIUM 2020-09-25 2021-06-22
CVE-2020-15371 Brocade Fabric OS versions before Brocade Fabric OS v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, contains code injection a... 9.8 - CRITICAL 2020-09-25 2021-08-23
CVE-2020-15370 Brocade Fabric OS versions before Brocade Fabric OS v7.4.2g could allow an authenticated, remote attacker to view a user pass... 6.5 - MEDIUM 2020-09-25 2021-06-22
CVE-2020-15369 Supportlink CLI in Brocade Fabric OS Versions v8.2.1 through v8.2.1d, and 8.2.2 versions before v8.2.2c does not obfuscate th... 8.8 - HIGH 2020-09-25 2021-08-23
CVE-2019-16204 Brocade Fabric OS Versions before v7.4.2f, v8.2.2a, v8.1.2j and v8.2.1d could expose external passwords, common secrets or au... 7.5 - HIGH 2020-02-05 2022-01-01

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
BrocadeFabric Os8.2.2cAllAllAll
Operating
System
BrocadeFabric Os8.2.2bAllAllAll
Operating
System
BrocadeFabric Os8.2.2a1AllAllAll
Operating
System
BrocadeFabric Os8.2.2aAllAllAll
Operating
System
BrocadeFabric Os8.2.2AllAllAll
Operating
System
BrocadeFabric Os8.2.1eAllAllAll
Operating
System
BrocadeFabric Os8.2.1dAllAllAll
Operating
System
BrocadeFabric Os8.2.1bAllAllAll
Operating
System
BrocadeFabric Os8.2.1aAllAllAll
Operating
System
BrocadeFabric Os8.2.1AllAllAll
Operating
System
BrocadeFabric Os8.2.0_cbn3AllAllAll
Operating
System
BrocadeFabric Os8.2.0aAllAllAll
Operating
System
BrocadeFabric Os8.2.0AllAllAll
Operating
System
BrocadeFabric Os8.1.2kAllAllAll
Operating
System
BrocadeFabric Os8.1.2jAllAllAll
Operating
System
BrocadeFabric Os8.1.2fAllAllAll
Operating
System
BrocadeFabric Os8.1.2eAllAllAll
Operating
System
BrocadeFabric Os8.1.2dAllAllAll
Operating
System
BrocadeFabric Os8.1.2cAllAllAll
Operating
System
BrocadeFabric Os8.1.2bAllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report