Vulnerability Details : CVE-2022-28170
Brocade Fabric OS Web Application services before Brocade Fabric v9.1.0, v9.0.1e, v8.2.3c, v7.4.2j store server and user passwords in the debug statements. This could allow a local user to extract the passwords from a debug file.
Published
2022-10-25 21:15:39
Updated
2023-03-02 16:06:04
Products affected by CVE-2022-28170
- cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
- cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
- cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
- cpe:2.3:o:broadcom:fabric_operating_system:9.1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-28170
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-28170
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
2.0
|
4.0
|
NIST |
CWE ids for CVE-2022-28170
-
The product stores sensitive information without properly limiting read or write access by unauthorized actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-28170
-
https://security.netapp.com/advisory/ntap-20230127-0002/
CVE-2022-28170 Brocade Fabric OS Vulnerability | NetApp Product SecurityThird Party Advisory
-
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2076
BSA-2022-2076Vendor Advisory
Jump to