Brocade ASCG before 3.2.0 Web Interface is not
enforcing HSTS, as defined by RFC 6797. HSTS is an optional response
header that can be configured on the server to instruct the browser to
only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking
protections.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 28 Feb 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Brocade ASCG before 3.2.0 Web Interface is not enforcing HSTS, as defined by RFC 6797. HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections. | |
| Title | Brocade ASCG 3.2.0 web interface does not enforce HSTS, as defined by RFC 6797 for ports 8030 and 8100 | |
| Weaknesses | CWE-523 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: brocade
Published: 2025-02-28T21:52:33.870Z
Updated: 2025-03-04T19:44:55.094Z
Reserved: 2024-02-14T20:17:33.442Z
Link: CVE-2024-1509
Updated: 2025-03-04T19:44:49.009Z
Status : Received
Published: 2025-02-28T22:15:38.573
Modified: 2025-02-28T22:15:38.573
Link: CVE-2024-1509
No data.