The American Cyber Security and Infrastructure Security Agency (CISA) is warning of broadcom brocade fabric OS, Comvolt web server and Qualitia active! Mail clients weaknesses that are actively exploited in attacks.
Yesterday Sisa’s ‘known exploited weaknesses’ added flaws (Kev) CatalogThe broadcom brokeade fabric was not tagged as the first exploitation with OS and Comvolt Falls.
Broadcom brokeade fabric OS is a special operating system that runs on the company’s brocade fiber channel switch and manages and optimizes the storage area network (SAN).
Earlier this month, Broadcom revealed an arbitrary code execution defect affecting the fabric OS version 9.1.0 through the 9.1.1D6, which was tracked under CVE-2015–1976.
While exploitation of defects requires administrator privileges, Broadcom says it has been actively exploited in attacks.
“This vulnerability can allow the user to execute any existing fabric OS command or it can also be used to modify the fabric OS itself, including adding its own subtleties,” Reads Broadcom’s bulletin,
“Even though it requires a legal access to a role with the first administrator privileges to achieve this exploitation, this vulnerability has been actively exploited in the region.”
The CVE-2025–1976 was addressed with the release of the brocade fabric OS 9.1.1D7. The latest branch, 9.2.0, is not affected by this vulnerability.
Comvolt defects tracked under Cve-2025-3928There is an unspecified security problem that can exploit certified attackers from a distance to webshal on target servers.
Commvault web servers are the user-support and API components of the backup systems used by enterprises to protect and restore vital data.
Despite the requirements for authentication and risk of environment on the Internet, the defect is subject to active exploitation in the wild.
CVE-2025-3928 was fixed in 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms.
The third defect added to the kev is the CISA CVE-2025-42599, which affects all versions of the active stack-based buffer overflow problem! With ‘Buildinfo: 6.60.05008561’ on all OS platforms.
Active! Mail is a web-based email client used widely used by government, financial and IT service organizations in Japan.
The defect was actively exploited by Japan’s certified last week, while SMB providers and ISPs in the country also announced service outage due to the relevant exploitation activity.
Qualitia addressed the problem with the release of active release! Mail 6 Buildinfo: 6.60.06008562.
CISA has given to the affected organizations affected by 17 May, 2025, to implement the fix or available mitigation for the other two flaws for CVE-2025-3928 and 19 May 2025.