{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T14:37:03.838","vulnerabilities":[{"cve":{"id":"CVE-2023-5973","sourceIdentifier":"sirt@brocade.com","published":"2024-04-05T03:15:07.770","lastModified":"2025-02-13T18:16:02.713","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Brocade\n Web Interface in Brocade Fabric OS v9.x and before v9.2.0 does not \nproperly represent the portName to the user if the portName contains \nreserved characters. This could allow an authenticated user to alter the\n UI of the Brocade Switch and change ports display."},{"lang":"es","value":"La interfaz web de Brocade en Brocade Fabric OS v9.x y versiones anteriores a v9.2.0 no representa correctamente el nombre del puerto para el usuario si el nombre del puerto contiene caracteres reservados. Esto podría permitir a un usuario autenticado alterar la interfaz de usuario del Brocade Switch y cambiar la visualización de los puertos."}],"metrics":{"cvssMetricV31":[{"source":"sirt@brocade.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"sirt@brocade.com","type":"Secondary","description":[{"lang":"en","value":"CWE-346"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-346"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.2.0","matchCriteriaId":"34B4DD91-794C-41EC-BA06-19BF0F91F188"}]}]}],"references":[{"url":"https://security.netapp.com/advisory/ntap-20240628-0005/","source":"sirt@brocade.com","tags":["Third Party Advisory"]},{"url":"https://support.broadcom.com/external/content/SecurityAdvisories/0/23214","source":"sirt@brocade.com","tags":["Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20240628-0005/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://support.broadcom.com/external/content/SecurityAdvisories/0/23214","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}