Brocade Fabric OS <=9.2.1: Session Password Disclosure
CVE-2024-29953 Published on June 26, 2024

Encoded session passwords on session storage for Virtual Fabric platforms
A vulnerability in the web interface in Brocade Fabric OS before v9.2.1, v9.2.0b, and v9.1.1d prints encoded session passwords on session storage for Virtual Fabric platforms. This could allow an authenticated user to view other users' session encoded passwords.

NVD

Vulnerability Analysis

CVE-2024-29953 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

Insecure Storage of Sensitive Information

The software stores sensitive information without properly limiting read or write access by unauthorized actors. If read access is not properly restricted, then attackers can steal the sensitive information. If write access is not properly restricted, then attackers can modify and possibly delete the data, causing incorrect results and possibly a denial of service.


Products Associated with CVE-2024-29953

stack.watch emails you whenever new vulnerabilities are published in Broadcom Fabric Operating System or Brocade Fabric Os. Just hit a watch button to start following.

 
 

Affected Versions

Brocade Fabric OS Version before v9.2.1, v9.2.0b, and v9.1.1d is affected by CVE-2024-29953

Exploit Probability

EPSS
0.37%
Percentile
58.20%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.