Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
fabric_operating_system Vendor: broadcom

About This Product

fabric_operating_system is a software product offered by broadcom. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 95 known vulnerabilities affecting broadcom fabric_operating_system. This includes 8 critical-severity issues and 46 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2004 to 2026, indicating a sustained research interest and ongoing security attention. 37 medium-severity issues and 4 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2004-1663 2004-09-04 2025-04-03 - 5.0 Likely
CVE-2016-4376 2016-08-22 2025-04-12 6.5 7.8 Likely
CVE-2016-8202 2017-05-08 2025-04-20 8.8 9.0 Likely
CVE-2017-6225 2018-02-08 2024-11-21 6.1 4.3 Likely
CVE-2017-6227 2018-02-08 2024-11-21 6.5 6.1 Unknown
CVE-2018-6433 2018-11-08 2024-11-21 5.5 2.1 Unknown
CVE-2018-6434 2018-11-08 2024-11-21 7.5 5.0 Likely
CVE-2018-6435 2018-11-08 2024-11-21 7.8 7.2 Unknown
CVE-2018-6441 2018-11-08 2024-11-21 7.8 7.2 Unknown
CVE-2018-6442 2018-11-08 2024-11-21 8.8 6.5 Likely
CVE-2018-6436 2018-11-08 2024-11-21 7.8 7.2 Unknown
CVE-2018-6437 2018-11-08 2024-11-21 7.8 7.2 Unknown
CVE-2018-6438 2018-11-08 2024-11-21 7.8 7.2 Unknown
CVE-2018-6439 2018-12-03 2024-11-21 7.8 7.2 Unknown
CVE-2018-6440 2018-12-03 2024-11-21 9.1 6.4 Likely
CVE-2019-18683 2019-11-04 2024-11-21 7.0 6.9 Unknown
CVE-2019-18805 2019-11-07 2024-11-21 9.8 7.5 Likely
CVE-2019-19050 2019-11-18 2024-11-21 7.5 7.8 Likely
CVE-2019-19069 2019-11-18 2024-11-21 7.5 7.8 Likely
CVE-2019-16203 2020-02-05 2024-11-21 7.5 5.0 Likely
CVE-2019-16204 2020-02-05 2024-11-21 7.5 5.0 Likely
CVE-2020-1967 2020-04-21 2024-11-21 7.5 5.0 Likely
CVE-2020-13645 2020-05-28 2024-11-21 6.5 6.4 Likely
CVE-2020-15778 2020-07-24 2025-07-28 7.4 6.8 Likely
CVE-2018-6447 2020-09-25 2024-11-21 5.4 3.5 Unknown
CVE-2018-6448 2020-09-25 2024-11-21 7.5 5.0 Likely
CVE-2018-6449 2020-09-25 2024-11-21 6.1 4.3 Likely
CVE-2020-15369 2020-09-25 2024-11-21 8.8 4.0 Likely
CVE-2020-15370 2020-09-25 2024-11-21 6.5 4.0 Likely
CVE-2020-15371 2020-09-25 2024-11-21 9.8 7.5 Likely
CVE-2020-15372 2020-09-25 2024-11-21 5.5 2.1 Unknown
CVE-2020-15373 2020-09-25 2024-11-21 9.8 7.5 Likely
CVE-2020-15374 2020-09-25 2024-11-21 9.8 7.5 Likely
CVE-2020-29660 2020-12-09 2024-11-21 4.4 2.1 Unknown
CVE-2020-29661 2020-12-09 2024-11-21 7.8 7.2 Unknown
CVE-2020-15375 2020-12-11 2024-11-21 6.7 4.6 Unknown
CVE-2020-15376 2020-12-11 2024-11-21 4.3 4.0 Likely
CVE-2019-25013 2021-01-04 2025-06-09 5.9 7.1 Likely
CVE-2021-22876 2021-04-01 2025-06-09 5.3 5.0 Likely
CVE-2021-22890 2021-04-01 2025-06-09 3.7 4.3 Likely
CVE-2020-15383 2021-06-09 2024-11-21 7.5 5.0 Likely
CVE-2020-15386 2021-06-09 2024-11-21 5.3 5.0 Likely
CVE-2020-15387 2021-06-09 2024-11-21 7.4 5.8 Likely
CVE-2021-27790 2021-08-12 2024-11-21 7.8 7.2 Unknown
CVE-2021-27791 2021-08-12 2024-11-21 5.4 5.5 Likely
CVE-2021-27792 2021-08-12 2024-11-21 7.8 7.2 Unknown
CVE-2021-27793 2021-08-12 2024-11-21 5.3 5.0 Likely
CVE-2021-27794 2021-08-12 2024-11-21 7.8 4.6 Unknown
CVE-2021-27796 2022-02-21 2024-11-21 6.5 6.8 Likely
CVE-2021-27797 2022-02-21 2024-11-21 9.8 7.5 Likely
CVE-2020-15388 2022-03-18 2024-11-21 6.5 4.0 Likely
CVE-2021-27789 2022-03-18 2024-11-21 6.5 4.0 Likely
CVE-2021-27798 2022-08-05 2025-02-15 5.5 - -
CVE-2022-28169 2022-10-25 2025-05-09 8.8 - -
CVE-2022-28170 2022-10-25 2025-05-09 6.5 - -
CVE-2022-33178 2022-10-25 2025-05-07 7.2 - -
CVE-2022-33179 2022-10-25 2025-05-09 8.8 - -
CVE-2022-33180 2022-10-25 2025-05-09 5.5 - -
CVE-2022-33181 2022-10-25 2025-05-07 5.5 - -
CVE-2022-33182 2022-10-25 2025-05-07 7.8 - -
CVE-2022-33183 2022-10-25 2025-05-07 8.8 - -
CVE-2022-33184 2022-10-25 2025-05-07 7.8 - -
CVE-2022-33185 2022-10-25 2025-05-09 7.8 - -
CVE-2022-33186 2022-12-08 2026-02-05 9.8 - -
CVE-2023-31425 2023-08-01 2025-02-13 7.8 - -
CVE-2023-31429 2023-08-01 2024-11-21 5.5 - -
CVE-2023-31426 2023-08-01 2024-11-21 6.8 - -
CVE-2023-31427 2023-08-01 2025-02-13 7.8 - -
CVE-2023-3489 2023-08-31 2025-02-13 8.6 - -
CVE-2023-4162 2023-08-31 2026-02-20 4.4 - -
CVE-2023-4163 2023-08-31 2025-02-13 4.4 - -
CVE-2021-27795 2023-12-06 2024-11-21 6.4 - -
CVE-2023-3454 2024-04-04 2025-02-13 8.6 - -
CVE-2023-38709 2024-04-04 2025-11-04 7.3 - -
CVE-2024-24795 2024-04-04 2025-06-30 6.3 - -
CVE-2023-5973 2024-04-05 2025-02-13 4.3 - -
CVE-2024-29953 2024-06-26 2025-02-04 4.3 - -
CVE-2024-29954 2024-06-26 2024-11-21 5.9 - -
CVE-2024-5460 2024-06-26 2025-02-04 8.1 - -
CVE-2024-3596 2024-07-09 2025-11-04 9.0 - -
CVE-2024-7516 2024-11-12 2025-02-04 7.1 - -
CVE-2024-10403 2024-11-21 2025-02-04 7.5 - -
CVE-2024-7517 2024-11-21 2026-02-20 7.8 - -
CVE-2024-5461 2025-02-15 2026-02-23 8.0 - -
CVE-2024-5462 2025-02-15 2026-02-23 7.5 - -
CVE-2025-1976 2025-04-24 2025-10-24 6.7 - -
CVE-2025-4661 2025-06-19 2026-02-06 2.3 - -
CVE-2025-4663 2025-07-08 2026-02-20 4.9 - -
CVE-2025-58379 2026-02-03 2026-02-06 5.5 - -
CVE-2025-58382 2026-02-03 2026-02-06 7.2 - -
CVE-2025-58383 2026-02-03 2026-02-06 7.2 - -
CVE-2026-0383 2026-02-03 2026-02-06 7.8 - -
CVE-2025-58380 2026-02-03 2026-02-06 2.3 - -
CVE-2025-58381 2026-02-03 2026-02-06 2.3 - -
CVE-2025-9711 2026-02-03 2026-02-06 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for broadcom fabric_operating_system by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.