CVE-2026-0869
Authentication Bypass in Brocade ASCG 3.4.0 Enables Unauthorized Operations
Publication date: 2026-03-03
Last updated on: 2026-03-09
Assigner: Brocade Communications Systems, LLC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| broadcom | brocade_active_support_connectivity_gateway | 3.4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-305 | The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an authentication bypass in Brocade ASCG version 3.4.0. It allows an unauthorized user to perform ASCG operations related to Brocade Support Link (BSL) and streaming configuration without proper authentication.
An attacker exploiting this vulnerability could disable the ASCG application or prevent the use of BSL data collection on Brocade switches within the fabric.
How can this vulnerability impact me? :
The impact of this vulnerability includes unauthorized access to ASCG operations, which could lead to disabling critical applications like ASCG or blocking BSL data collection on Brocade switches.
This could disrupt network management and monitoring, potentially causing operational issues within the fabric where these switches are deployed.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know