An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 (CVE-2022-22576)
22718
07 November 2023
07 November 2023
OPEN
MEDIUM
8.1 HIGH - Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVE-2022-22576
Brocade Security Advisory ID |
BSA-2023-1926 |
Component |
CURL |
|
|
Summary
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
Products Affected
- Brocade ASG before v3.0
Products Confirmed Not Affected
- Brocade Fabric OS
Brocade SAnnav
Solution
Brocade has released security updates that address the vulnerabilities described in this advisory. Brocade Customers should obtain the security updates through their usual update channels.
Credit
The issue was found during an internal security assessment.
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
November 7, 2023 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.