Brocade ASCG before 3.2.0 Web Interface is not
enforcing HSTS, as defined by RFC 6797. HSTS is an optional response
header that can be configured on the server to instruct the browser to
only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking
protections.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 28 Feb 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Brocade ASCG before 3.2.0 Web Interface is not enforcing HSTS, as defined by RFC 6797. HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections. | |
Title | Brocade ASCG 3.2.0 web interface does not enforce HSTS, as defined by RFC 6797 for ports 8030 and 8100 | |
Weaknesses | CWE-523 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: brocade
Published: 2025-02-28T21:52:33.870Z
Updated: 2025-03-04T19:44:55.094Z
Reserved: 2024-02-14T20:17:33.442Z
Link: CVE-2024-1509

Updated: 2025-03-04T19:44:49.009Z

Status : Received
Published: 2025-02-28T22:15:38.573
Modified: 2025-02-28T22:15:38.573
Link: CVE-2024-1509

No data.