PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-8207 Brocade CVE debrief

CVE-2016-8207 is a high-severity directory traversal vulnerability in Brocade Network Advisor’s CliMonitorReportServlet. In affected releases up to and including 14.0.2, a remote attacker could read arbitrary files on the server, including files containing sensitive user information.

Vendor
Brocade
Product
CVE-2016-8207
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-14
Original CVE updated
2026-05-13
Advisory published
2017-01-14
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for Brocade Network Advisor deployments, especially any systems running versions prior to or including 14.0.2. Because the issue allows unauthenticated remote file reads, environments that expose the service to untrusted networks should treat it as urgent.

Technical summary

NVD classifies the weakness as CWE-22 (Path Traversal) with CVSS v3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The vulnerable component is CliMonitorReportServlet in Brocade Network Advisor, and the affected CPE range is versions through 14.0.2 inclusive. The impact described in the source record is arbitrary file read, with potential exposure of sensitive user information.

Defensive priority

High. File-read vulnerabilities in network-accessible management software can expose credentials, configuration, and other sensitive data. Prioritize patching or upgrading affected Brocade Network Advisor instances beyond 14.0.2 and verify exposure of the servlet path in your environment.

Recommended defensive actions

  • Confirm whether any Brocade Network Advisor systems are running version 14.0.2 or earlier.
  • Upgrade or otherwise remediate affected installations using the vendor’s guidance and security advisory references.
  • Restrict network access to management interfaces and servlet endpoints to trusted administrative networks.
  • Review server and application access logs for unusual requests targeting path traversal patterns.
  • Check for exposure of sensitive files and rotate any credentials or secrets that may have been accessible.

Evidence notes

All statements above are based on the supplied NVD record and its referenced vendor/third-party advisories. The record identifies the issue as a directory traversal in CliMonitorReportServlet, affected versions through 14.0.2, CWE-22, and CVSS v3.0 7.5 with no integrity or availability impact listed. No KEV entry was supplied in the provided data.

Official resources

Published in the official CVE/NVD record on 2017-01-14. No Known Exploited Vulnerabilities (KEV) listing was provided in the source data.