CVE-2024-1509

Brocade ASCG before 3.2.0 Web Interface is not enforcing HSTS, as defined by RFC 6797. HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.
Configurations

Configuration 1 (hide)

cpe:2.3:a:brocade:active_support_connectivity_gateway:*:*:*:*:*:*:*:*

History

29 Jan 2026, 02:08

Type Values Removed Values Added
First Time Brocade
Brocade active Support Connectivity Gateway
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
References () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25428 - () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25428 - Third Party Advisory
Summary
  • (es) La interfaz web de Brocade ASCG anterior a la versión 3.2.0 no aplica HSTS, tal como se define en RFC 6797. HSTS es un encabezado de respuesta opcional que se puede configurar en el servidor para indicar al navegador que solo se comunique a través de HTTPS. La falta de HSTS permite ataques de degradación, ataques de intermediarios que eliminan SSL y debilita las protecciones contra el secuestro de cookies.
CPE cpe:2.3:a:brocade:active_support_connectivity_gateway:*:*:*:*:*:*:*:*

28 Feb 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-28 22:15

Updated : 2026-01-29 02:08


NVD link : CVE-2024-1509

Mitre link : CVE-2024-1509

CVE.ORG link : CVE-2024-1509


JSON object : View

Products Affected

brocade

  • active_support_connectivity_gateway
CWE
CWE-523

Unprotected Transport of Credentials