Exposure of REST API Authentication Token in Brocade SANnav by Broadcom
CVE-2022-28162
3.3LOW
Summary
Brocade SANnav versions before 2.2.0 unintentionally store REST API authentication tokens in plain text logs, posing a risk of unauthorized access. This oversight can allow malicious actors to capture sensitive tokens, leading to potential exploitation of the affected systems. Organizations using vulnerable versions should prioritize upgrading to mitigate the risk of sensitive data exposure.
Affected Version(s)
Brocade SANNav Brocade SANNav before 2.2.0
References
CVSS V3.1
Score:
3.3
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved