{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T06:23:10.101","vulnerabilities":[{"cve":{"id":"CVE-2020-15369","sourceIdentifier":"sirt@brocade.com","published":"2020-09-25T14:15:13.453","lastModified":"2024-11-21T05:05:25.783","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Supportlink CLI in Brocade Fabric OS Versions v8.2.1 through v8.2.1d, and 8.2.2 versions before v8.2.2c does not obfuscate the password field, which could expose users’ credentials of the remote server. An authenticated user could obtain the exposed password credentials to gain access to the remote host."},{"lang":"es","value":"La CLI de Supportlink en Brocade Fabric OS Versiones v8.2.1 hasta v8.2.1d, y versiones 8.2.2 anteriores a v8.2.2c, no oculta el campo password, lo que podría exponer las credenciales de usuarios del servidor remoto.&#xa0;Un usuario autenticado podría obtener las credenciales de contraseña expuestas para conseguir acceso al host remoto"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-521"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"0C91FB6C-7BF5-453E-A618-06756D3DD2FB"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1a:*:*:*:*:*:*:*","matchCriteriaId":"7CF38E78-8243-4615-A8A1-1396920F5BA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1b:*:*:*:*:*:*:*","matchCriteriaId":"84E4F075-D03B-4D98-8C9E-840D80DFFF48"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1c:*:*:*:*:*:*:*","matchCriteriaId":"CDDF78F1-A7F3-4656-AD5D-6D84F83B34F0"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1d:*:*:*:*:*:*:*","matchCriteriaId":"DAA3D3F6-C768-4096-A2CA-8CC406A92D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2:*:*:*:*:*:*:*","matchCriteriaId":"B244FB24-0767-4DC4-9988-ED8C5D9D9A91"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2a:*:*:*:*:*:*:*","matchCriteriaId":"7DDA4E8C-F140-4E39-9A6F-7883F2822499"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2a1:*:*:*:*:*:*:*","matchCriteriaId":"441E912B-4DD8-4A04-8072-04CE30D5A436"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2b:*:*:*:*:*:*:*","matchCriteriaId":"B3B33CEA-BE17-411D-86FF-388B21E8F018"}]}]}],"references":[{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1078","source":"sirt@brocade.com","tags":["Vendor Advisory"]},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1078","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}