{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T15:58:04.522","vulnerabilities":[{"cve":{"id":"CVE-2017-6227","sourceIdentifier":"sirt@brocade.com","published":"2018-02-08T22:29:00.270","lastModified":"2024-11-21T03:29:18.297","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the IPv6 stack on Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) versions before 7.4.2b, 8.1.2 and 8.2.0 could allow an attacker to cause a denial of service (CPU consumption and device hang) condition by sending crafted Router Advertisement (RA) messages to a targeted system."},{"lang":"es","value":"Una vulnerabilidad en la pila IPv6 de productos Brocade Fibre Channel SAN que ejecutan versiones de Brocade Fabric OS (FOS) anteriores a la 7.4.2b, 8.1.2 y 8.2.0 podría permitir que un atacante provoque una condición de denegación de servicio (consumo de CPU y bloqueo del dispositivo) enviando mensajes Router Advertisement (RA) manipulados a un sistema objetivo."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:N/I:N/A:C","baseScore":6.1,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":6.5,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*","versionEndExcluding":"7.4.2b","matchCriteriaId":"E80B46F5-ED68-4AA1-BB45-14CCE854385D"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.0.0:*:*:*:*:*:*:*","matchCriteriaId":"A234DD0C-6C62-4A5E-B093-14F54710C2F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.0.1:*:*:*:*:*:*:*","matchCriteriaId":"CA532CBE-FCAF-4AE7-9A39-808864223E41"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.0.2:*:*:*:*:*:*:*","matchCriteriaId":"3C9EBAFF-2358-4EEC-9E83-EBCAC8805414"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.1.0:*:*:*:*:*:*:*","matchCriteriaId":"7727C720-11C5-48DA-B604-6D296B0A9521"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.1.1:*:*:*:*:*:*:*","matchCriteriaId":"79418EEC-72C2-4A85-97CE-7B472E9AAF79"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E064A2B0-8316-4192-A319-81778BE7923C"},{"vulnerable":true,"criteria":"cpe:2.3:o:brocade:fabric_os:8.0.2b2:*:*:*:*:*:*:*","matchCriteriaId":"C315549C-5ABE-4EC5-AF7C-741AD70E2112"}]}]}],"references":[{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-526","source":"sirt@brocade.com"},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-526","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}