The Web application of Brocade Fabric OS before versions Brocade Fabric OS v9.0.1a and v8.2.3a contains debug statements that expose sensitive information to the program's standard output device. An attacker who has compromised the FOS system may utilize this weakness to capture sensitive information, such as user credentials.
References
Link | Resource |
---|---|
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1494 | Not Applicable Vendor Advisory |
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1494 | Not Applicable Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1494 - Not Applicable, Vendor Advisory |
Information
Published : 2022-03-18 18:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-27789
Mitre link : CVE-2021-27789
CVE.ORG link : CVE-2021-27789
JSON object : View
Products Affected
broadcom
- fabric_operating_system
CWE