PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-8204 Broadcom CVE debrief

CVE-2016-8204 is a critical directory traversal flaw in Brocade Network Advisor's FileReceiveServlet. According to the NVD record, versions released up to and including 14.0.2 are affected, and a remote attacker could upload a malicious file into a filesystem location where it can be executed. The NVD rates the issue CVSS 3.1 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting a high-impact, network-reachable exposure.

Vendor
Broadcom
Product
CVE-2016-8204
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-14
Original CVE updated
2026-05-13
Advisory published
2017-01-14
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for Broadcom/Brocade Network Advisor deployments, especially any environment still running version 14.0.2 or earlier. Because the issue is remote, unauthenticated, and can lead to code execution, internet-facing or broadly reachable management systems should be treated as high risk.

Technical summary

The NVD lists the weakness as CWE-22 (Path Traversal) in FileReceiveServlet. The vulnerable scope is Brocade Network Advisor versions through 14.0.2, with a vulnerable CPE entry for broadcom:brocade_network_advisor. The core risk is that crafted path handling may allow a remote attacker to place a file in a sensitive location, including a location where it can execute, creating a path from traversal to code execution.

Defensive priority

Immediate for any exposed or actively used Brocade Network Advisor instance at or below 14.0.2. Treat as a critical remediation item because the attack requires no privileges or user interaction and the published CVSS score is 9.8.

Recommended defensive actions

  • Confirm whether Brocade Network Advisor is deployed anywhere in the environment, including legacy or administrative networks.
  • Inventory versions and identify any instance at version 14.0.2 or earlier.
  • Apply the vendor-recommended remediation from the Broadcom advisory for CVE-2016-8204, or upgrade to a fixed release if available.
  • Restrict network access to the management interface until remediation is complete, especially from untrusted or adjacent networks.
  • Review the FileReceiveServlet exposure and any upload-related functionality for unusual files or unexpected write activity.
  • After remediation, verify that only authorized administrators can reach the management service and that file upload paths are properly constrained.
  • Monitor for signs of unauthorized file placement or execution in the product's install and working directories.

Evidence notes

This debrief is based on the supplied NVD CVE record and listed references. The record names the vulnerability as a directory traversal in FileReceiveServlet, affected versions as through 14.0.2, CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, and CWE-22. The supplied source also includes references to a Broadcom security advisory, ZDI-17-049, SecurityFocus BID 95695, and an HPE advisory. No KEV listing or ransomware linkage was provided in the corpus.

Official resources

Published by the CVE/NVD record on 2017-01-14. No KEV date was provided in the supplied corpus. Broadcom/Brocade advisory references are listed in the NVD metadata.