CVE Vulnerabilities

CVE-2020-15369

Weak Password Requirements

Published: Sep 25, 2020 | Modified: Aug 23, 2021
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu

Supportlink CLI in Brocade Fabric OS Versions v8.2.1 through v8.2.1d, and 8.2.2 versions before v8.2.2c does not obfuscate the password field, which could expose users’ credentials of the remote server. An authenticated user could obtain the exposed password credentials to gain access to the remote host.

Weakness

The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.

Affected Software

Name Vendor Start Version End Version
Fabric_operating_system Broadcom 8.2.1 (including) 8.2.1 (including)
Fabric_operating_system Broadcom 8.2.1a (including) 8.2.1a (including)
Fabric_operating_system Broadcom 8.2.1b (including) 8.2.1b (including)
Fabric_operating_system Broadcom 8.2.1c (including) 8.2.1c (including)
Fabric_operating_system Broadcom 8.2.1d (including) 8.2.1d (including)
Fabric_operating_system Broadcom 8.2.2 (including) 8.2.2 (including)
Fabric_operating_system Broadcom 8.2.2a (including) 8.2.2a (including)
Fabric_operating_system Broadcom 8.2.2a1 (including) 8.2.2a1 (including)
Fabric_operating_system Broadcom 8.2.2b (including) 8.2.2b (including)

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References