{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T07:03:20.986","vulnerabilities":[{"cve":{"id":"CVE-2020-15383","sourceIdentifier":"sirt@brocade.com","published":"2021-06-09T15:15:08.107","lastModified":"2024-11-21T05:05:27.397","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Running security scans against the SAN switch can cause config and secnotify processes within the firmware before Brocade Fabric OS v9.0.0, v8.2.2d and v8.2.1e to consume all memory leading to denial of service impacts possibly including a switch panic."},{"lang":"es","value":"Una ejecución de escaneos de seguridad contra el SAN switch puede causar a los procesos de configuración y notificación secundaria dentro de las versiones de firmware anteriores a Brocade Fabric OS v9.0.0, v8.2.2d y v8.2.1e, consumir toda la memoria, conllevando a impactos de denegación de servicio que posiblemente incluyen un switch panic"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*","versionEndExcluding":"8.2.1","matchCriteriaId":"017C502B-C9AA-41EF-BBE1-F34DAD9A21F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"0C91FB6C-7BF5-453E-A618-06756D3DD2FB"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1a:*:*:*:*:*:*:*","matchCriteriaId":"7CF38E78-8243-4615-A8A1-1396920F5BA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1b:*:*:*:*:*:*:*","matchCriteriaId":"84E4F075-D03B-4D98-8C9E-840D80DFFF48"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1c:*:*:*:*:*:*:*","matchCriteriaId":"CDDF78F1-A7F3-4656-AD5D-6D84F83B34F0"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1d:*:*:*:*:*:*:*","matchCriteriaId":"DAA3D3F6-C768-4096-A2CA-8CC406A92D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2a1:*:*:*:*:*:*:*","matchCriteriaId":"441E912B-4DD8-4A04-8072-04CE30D5A436"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2b:*:*:*:*:*:*:*","matchCriteriaId":"B3B33CEA-BE17-411D-86FF-388B21E8F018"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2c:*:*:*:*:*:*:*","matchCriteriaId":"D4CB0EA0-D553-4D17-867A-0DBD5D1F6764"}]}]}],"references":[{"url":"https://security.netapp.com/advisory/ntap-20210819-0002/","source":"sirt@brocade.com","tags":["Third Party Advisory"]},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1496","source":"sirt@brocade.com","tags":["Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20210819-0002/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1496","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}