By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database
Computing

CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database

News Room
Last updated: 2025/04/29 at 1:16 AM
News Room Published 29 April 2025
Share
SHARE

Apr 29, 2025Ravie LakshmananVulnerability / Web Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom Brocade Fabric OS and Commvault Web Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.

The vulnerabilities in question are listed below –

  • CVE-2025-1976 (CVSS score: 8.6) – A code injection flaw affecting Broadcom Brocade Fabric OS that allows a local user with administrative privileges to execute arbitrary code with full root privileges
  • CVE-2025-3928 (CVSS score: 8.7) – An unspecified flaw in the Commvault Web Server that allows a remote, authenticated attacker to create and execute web shells
Cybersecurity

“Exploiting this vulnerability requires a bad actor to have authenticated user credentials within the Commvault Software environment,” Commvault said in an advisory released in February 2025.

“Unauthenticated access is not exploitable. For software customers, this means your environment must be: (i) accessible via the internet, (ii) compromised through an unrelated avenue, and (iii) accessed leveraging legitimate user credentials.”

The vulnerability affects the following Windows and Linux versions –

  • 11.36.0 – 11.36.45 (Fixed in 11.36.46)
  • 11.32.0 – 11.32.88 (Fixed in 11.32.89)
  • 11.28.0 – 11.28.140 (Fixed in 11.28.141)
  • 11.20.0 – 11.20.216 (Fixed in 11.20.217)

As for CVE-2025-1976, Broadcom said that due to a flaw in IP Address validation, a local user with the admin privilege can potentially execute arbitrary code with root privileges on Fabric OS versions 9.1.0 through 9.1.1d6. It has been fixed in version 9.1.1d7.

“This vulnerability can allow the user to execute any existing Fabric OS command or can also be used to modify the Fabric OS itself, including adding their own subroutines,” Broadcom noted in a bulletin published on April 17, 2025.

Cybersecurity

“Even though achieving this exploit first requires valid access to a role with admin privileges, this vulnerability has been actively exploited in the field.”

There are currently no public details on how either of the vulnerabilities have been exploited in the wild, the scale of the attacks, and who may be behind them.

Federal Civilian Executive Branch (FCEB) agencies are recommended to apply the necessary patches for the Commvault Web Server by May 17, 2025, and Broadcom Brocade Fabric OS by May 19, respectively.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Samsung Galaxy S25 Edge leak reveals major specs, including how thin it actually is
Next Article Nikon Z 5 vs. Z5II: Which Full-Frame Camera Should You Buy?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Apple to reveal tariff-stricken Q3 results on July 31
News
Popular Fire TV Stick app filled with free channels and movies is shutting down
News
A Cry For Help: The Urgent Need For Spacetech Now | HackerNoon
Computing
Our Group Text Is Sending the Top July 4th and Prime Day Deals Directly to Your Phone
News

You Might also Like

Computing

A Cry For Help: The Urgent Need For Spacetech Now | HackerNoon

12 Min Read
Computing

Fedora Linux Looks To End Support For UEFI On MBR-Paritioned Disks

2 Min Read
Computing

Success Metrics in PR: How to Measure Campaign Effectiveness in IT | HackerNoon

8 Min Read
Computing

Decentralization Won’t Save Us From Ourselves | HackerNoon

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?