First published: Tue Oct 25 2022(Updated: )
Brocade Fabric OS Web Application services before Brocade Fabric v9.1.0, v9.0.1e, v8.2.3c, v7.4.2j store server and user passwords in the debug statements. This could allow a local user to extract the passwords from a debug file.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Fabric Operating System | <7.4.2j | |
Broadcom Fabric Operating System | >=8.0.0<8.2.3c | |
Broadcom Fabric Operating System | >=9.0.0<9.0.1e | |
Broadcom Fabric Operating System | =9.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identified as CVE-2022-28170 is related to Brocade Fabric OS Web Application services storing server and user passwords in debug statements.
A local user can exploit the CVE-2022-28170 vulnerability by extracting passwords from a debug file.
The affected versions of Brocade Fabric OS include v7.4.2j, v8.2.3c, v9.0.1e, and v9.1.0.
CVE-2022-28170 has a severity rating of 6.5, which is considered medium.
Yes, you can refer to the following links for more information about CVE-2022-28170: [NetApp Security Advisory](https://security.netapp.com/advisory/ntap-20230127-0002/) and [Brocade Security Advisory](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2076).