First published: Thu Nov 21 2024(Updated: )
Brocade Fabric OS versions before 8.2.3e2, versions 9.0.0 through 9.2.0c, and 9.2.1 through 9.2.1a can capture the SFTP/FTP server password used for a firmware download operation initiated by SANnav or through WebEM in a weblinker core dump that is later captured via supportsave.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Brocade FABRIC OS (FOS) | <8.2.3e2>=9.0.0<=9.2.0c>=9.2.1<=9.2.1a | |
broadcom fabric operating system | <9.2.0c1 | |
broadcom fabric operating system | >=9.2.1<9.2.1a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10403 is classified as a high-severity vulnerability due to the risk of sensitive information disclosure.
To mitigate CVE-2024-10403, upgrade Brocade Fabric OS to version 8.2.3e2 or later, or ensure that versions 9.2.1a or higher are deployed.
CVE-2024-10403 affects Brocade Fabric OS versions prior to 8.2.3e2 and certain versions within the 9.x series.
CVE-2024-10403 can potentially expose SFTP/FTP server passwords used during firmware download operations.
Check the version of Brocade Fabric OS running on your system and compare it against the affected versions listed for CVE-2024-10403.