Authentication bypass in Brocade ASCG 3.4.0 Could allow an unauthorized user to perform ASCG operations related to Brocade Support Link(BSL) and streaming configuration. and could even disable the ASCG application or disable use of BSL data collection on Brocade switches within the fabric.
References
| Link | Resource |
|---|---|
| https://support.broadcom.com/external/content/SecurityAdvisories/0/37121 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Mar 2026, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:broadcom:brocade_active_support_connectivity_gateway:3.4.0:*:*:*:*:*:*:* | |
| First Time |
Broadcom brocade Active Support Connectivity Gateway
Broadcom |
|
| References | () https://support.broadcom.com/external/content/SecurityAdvisories/0/37121 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CWE | NVD-CWE-noinfo |
03 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-03 20:16
Updated : 2026-03-09 18:15
NVD link : CVE-2026-0869
Mitre link : CVE-2026-0869
CVE.ORG link : CVE-2026-0869
JSON object : View
Products Affected
broadcom
- brocade_active_support_connectivity_gateway
CWE
