Brocade ASCG before 3.2.0 Web Interface is not
enforcing HSTS, as defined by RFC 6797. HSTS is an optional response
header that can be configured on the server to instruct the browser to
only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking
protections.
References
| Link | Resource |
|---|---|
| https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25428 | Third Party Advisory |
Configurations
History
29 Jan 2026, 02:08
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Brocade
Brocade active Support Connectivity Gateway |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| References | () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25428 - Third Party Advisory | |
| Summary |
|
|
| CPE | cpe:2.3:a:brocade:active_support_connectivity_gateway:*:*:*:*:*:*:*:* |
28 Feb 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-28 22:15
Updated : 2026-01-29 02:08
NVD link : CVE-2024-1509
Mitre link : CVE-2024-1509
CVE.ORG link : CVE-2024-1509
JSON object : View
Products Affected
brocade
- active_support_connectivity_gateway
CWE
CWE-523
Unprotected Transport of Credentials
