PatchSiren cyber security CVE debrief
CVE-2016-8207 Brocade CVE debrief
CVE-2016-8207 is a high-severity directory traversal vulnerability in Brocade Network Advisor’s CliMonitorReportServlet. In affected releases up to and including 14.0.2, a remote attacker could read arbitrary files on the server, including files containing sensitive user information.
- Vendor
- Brocade
- Product
- CVE-2016-8207
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-14
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-14
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for Brocade Network Advisor deployments, especially any systems running versions prior to or including 14.0.2. Because the issue allows unauthenticated remote file reads, environments that expose the service to untrusted networks should treat it as urgent.
Technical summary
NVD classifies the weakness as CWE-22 (Path Traversal) with CVSS v3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The vulnerable component is CliMonitorReportServlet in Brocade Network Advisor, and the affected CPE range is versions through 14.0.2 inclusive. The impact described in the source record is arbitrary file read, with potential exposure of sensitive user information.
Defensive priority
High. File-read vulnerabilities in network-accessible management software can expose credentials, configuration, and other sensitive data. Prioritize patching or upgrading affected Brocade Network Advisor instances beyond 14.0.2 and verify exposure of the servlet path in your environment.
Recommended defensive actions
- Confirm whether any Brocade Network Advisor systems are running version 14.0.2 or earlier.
- Upgrade or otherwise remediate affected installations using the vendor’s guidance and security advisory references.
- Restrict network access to management interfaces and servlet endpoints to trusted administrative networks.
- Review server and application access logs for unusual requests targeting path traversal patterns.
- Check for exposure of sensitive files and rotate any credentials or secrets that may have been accessible.
Evidence notes
All statements above are based on the supplied NVD record and its referenced vendor/third-party advisories. The record identifies the issue as a directory traversal in CliMonitorReportServlet, affected versions through 14.0.2, CWE-22, and CVSS v3.0 7.5 with no integrity or availability impact listed. No KEV entry was supplied in the provided data.
Official resources
-
CVE-2016-8207 CVE record
CVE.org
-
CVE-2016-8207 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
- Source reference
- Source reference
Published in the official CVE/NVD record on 2017-01-14. No Known Exploited Vulnerabilities (KEV) listing was provided in the source data.