Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C91FB6C-7BF5-453E-A618-06756D3DD2FB", "vulnerable": true}, {"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.1a:*:*:*:*:*:*:*", "matchCriteriaId": "7CF38E78-8243-4615-A8A1-1396920F5BA1", "vulnerable": true}, {"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.1b:*:*:*:*:*:*:*", "matchCriteriaId": "84E4F075-D03B-4D98-8C9E-840D80DFFF48", "vulnerable": true}, {"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.1c:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF78F1-A7F3-4656-AD5D-6D84F83B34F0", "vulnerable": true}, {"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.1d:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3D3F6-C768-4096-A2CA-8CC406A92D6B", "vulnerable": true}, {"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B244FB24-0767-4DC4-9988-ED8C5D9D9A91", "vulnerable": true}, {"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.2a:*:*:*:*:*:*:*", "matchCriteriaId": "7DDA4E8C-F140-4E39-9A6F-7883F2822499", "vulnerable": true}, {"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.2a1:*:*:*:*:*:*:*", "matchCriteriaId": "441E912B-4DD8-4A04-8072-04CE30D5A436", "vulnerable": true}, {"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.2b:*:*:*:*:*:*:*", "matchCriteriaId": "B3B33CEA-BE17-411D-86FF-388B21E8F018", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Supportlink CLI in Brocade Fabric OS Versions v8.2.1 through v8.2.1d, and 8.2.2 versions before v8.2.2c does not obfuscate the password field, which could expose users\u2019 credentials of the remote server. An authenticated user could obtain the exposed password credentials to gain access to the remote host."}, {"lang": "es", "value": "La CLI de Supportlink en Brocade Fabric OS Versiones v8.2.1 hasta v8.2.1d, y versiones 8.2.2 anteriores a v8.2.2c, no oculta el campo password, lo que podr\u00eda exponer las credenciales de usuarios del servidor remoto. Un usuario autenticado podr\u00eda obtener las credenciales de contrase\u00f1a expuestas para conseguir acceso al host remoto"}], "id": "CVE-2020-15369", "lastModified": "2024-11-21T05:05:25.783", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-09-25T14:15:13.453", "references": [{"source": "sirt@brocade.com", "tags": ["Vendor Advisory"], "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1078"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1078"}], "sourceIdentifier": "sirt@brocade.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-521"}], "source": "nvd@nist.gov", "type": "Primary"}]}