Article Details

Scrape Timestamp (UTC): 2025-04-29 04:28:32.555

Source: https://thehackernews.com/2025/04/cisa-adds-actively-exploited-broadcom.html

Original Article Text

Click to Toggle View

CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom Brocade Fabric OS and Commvault Web Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities in question are listed below - "Exploiting this vulnerability requires a bad actor to have authenticated user credentials within the Commvault Software environment," Commvault said in an advisory released in February 2025. "Unauthenticated access is not exploitable. For software customers, this means your environment must be: (i) accessible via the internet, (ii) compromised through an unrelated avenue, and (iii) accessed leveraging legitimate user credentials." The vulnerability affects the following Windows and Linux versions - As for CVE-2025-1976, Broadcom said that due to a flaw in IP Address validation, a local user with the admin privilege can potentially execute arbitrary code with root privileges on Fabric OS versions 9.1.0 through 9.1.1d6. It has been fixed in version 9.1.1d7. "This vulnerability can allow the user to execute any existing Fabric OS command or can also be used to modify the Fabric OS itself, including adding their own subroutines," Broadcom noted in a bulletin published on April 17, 2025. "Even though achieving this exploit first requires valid access to a role with admin privileges, this vulnerability has been actively exploited in the field." There are currently no public details on how either of the vulnerabilities have been exploited in the wild, the scale of the attacks, and who may be behind them. Federal Civilian Executive Branch (FCEB) agencies are recommended to apply the necessary patches for the Commvault Web Server by May 17, 2025, and Broadcom Brocade Fabric OS by May 19, respectively.

Daily Brief Summary

CYBERCRIME // CISA Flags Broadcom and Commvault Flaws Amid Active Exploits

CISA has added two critical vulnerabilities in Broadcom Brocade Fabric OS and Commvault Web Server to its KEV catalog due to active exploitation.

The Broadcom vulnerability, identified as CVE-2025-1976, allows code execution with root access if exploited by a locally authenticated admin user.

This particular flaw affects Fabric OS versions from 9.1.0 to 9.1.1d6 and has been fixed in the subsequent version 9.1.1d7.

The Commvault vulnerability necessitates an attacker having authenticated user credentials, meaning the exploit is not feasible with unauthenticated access.

Affected systems must be internet-accessible and previously compromised through different means for the Commvault vulnerability to be exploitable.

The exact details of how these vulnerabilities have been exploited in the wild have not been disclosed.

CISA advises Federal Civilian Executive Branch agencies to patch the identified vulnerabilities by specific deadlines in May 2025 to mitigate risks.