CVE-2025-6391: CWE-532: Insertion of Sensitive Information into Log File in Broadcom Brocade ASCG
Brocade ASCG before 3.3.0 logs JSON Web Tokens (JWT) in log files. An attacker with access to the log files can withdraw the unencrypted tokens with security implications, such as unauthorized access, session hijacking, and information disclosure.
AI Analysis
Technical Summary
CVE-2025-6391 is a high-severity vulnerability affecting Broadcom's Brocade ASCG product versions prior to 3.3.0. The vulnerability stems from the improper handling of sensitive information, specifically JSON Web Tokens (JWTs), which are logged in plaintext within system log files. JWTs are commonly used for authentication and session management, containing encoded claims that can grant access to protected resources. By logging these tokens unencrypted, an attacker who gains access to the log files can extract these tokens and potentially perform unauthorized actions such as session hijacking, unauthorized access to systems, and information disclosure. The vulnerability is categorized under CWE-532, which involves the insertion of sensitive information into log files, a common security misconfiguration that can lead to significant confidentiality breaches. The CVSS 4.0 score of 7.1 reflects a high severity, with the vector indicating that the attack requires local access (AV:L) and privileges (PR:H), but no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, as the attacker can leverage stolen tokens to impersonate legitimate users or administrators. Although no known exploits are reported in the wild yet, the presence of such sensitive data in logs represents a critical security risk that should be addressed promptly. The lack of a patch link suggests that remediation may require upgrading to version 3.3.0 or later, where this logging behavior is presumably corrected.
Potential Impact
For European organizations using Brocade ASCG, this vulnerability poses a significant risk to the confidentiality and integrity of their authentication mechanisms. Unauthorized access via stolen JWTs could lead to data breaches, unauthorized configuration changes, and potential disruption of network services managed by Brocade ASCG. Given that Brocade ASCG is typically used in storage and network infrastructure environments, exploitation could compromise critical infrastructure components, impacting business continuity and regulatory compliance, especially under GDPR where unauthorized data access can lead to heavy fines. The local access requirement means that attackers would need some level of access to the system or network segment where logs are stored, which could be achieved through insider threats or lateral movement after initial compromise. The high privileges required further limit the attack surface but do not eliminate the risk, especially in complex enterprise environments where privilege escalation is possible. The exposure of JWTs in logs could also facilitate further attacks against other integrated systems relying on these tokens for authentication, amplifying the impact.
Mitigation Recommendations
European organizations should immediately audit their Brocade ASCG deployments to identify versions prior to 3.3.0 and plan for an upgrade to version 3.3.0 or later where the vulnerability is resolved. Until upgrades can be applied, organizations should restrict access to log files strictly, implementing strict file permissions and monitoring access logs for suspicious activity. Employing log management solutions that encrypt logs at rest and in transit can reduce the risk of token leakage. Additionally, organizations should consider implementing short-lived JWTs and token revocation mechanisms to limit the window of opportunity for token misuse. Network segmentation and the principle of least privilege should be enforced to minimize the risk of attackers gaining local access with elevated privileges. Regular security audits and monitoring for anomalous authentication patterns can help detect potential exploitation attempts. Finally, organizations should review their incident response plans to include scenarios involving token theft and session hijacking.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-6391: CWE-532: Insertion of Sensitive Information into Log File in Broadcom Brocade ASCG
Description
Brocade ASCG before 3.3.0 logs JSON Web Tokens (JWT) in log files. An attacker with access to the log files can withdraw the unencrypted tokens with security implications, such as unauthorized access, session hijacking, and information disclosure.
AI-Powered Analysis
Technical Analysis
CVE-2025-6391 is a high-severity vulnerability affecting Broadcom's Brocade ASCG product versions prior to 3.3.0. The vulnerability stems from the improper handling of sensitive information, specifically JSON Web Tokens (JWTs), which are logged in plaintext within system log files. JWTs are commonly used for authentication and session management, containing encoded claims that can grant access to protected resources. By logging these tokens unencrypted, an attacker who gains access to the log files can extract these tokens and potentially perform unauthorized actions such as session hijacking, unauthorized access to systems, and information disclosure. The vulnerability is categorized under CWE-532, which involves the insertion of sensitive information into log files, a common security misconfiguration that can lead to significant confidentiality breaches. The CVSS 4.0 score of 7.1 reflects a high severity, with the vector indicating that the attack requires local access (AV:L) and privileges (PR:H), but no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, as the attacker can leverage stolen tokens to impersonate legitimate users or administrators. Although no known exploits are reported in the wild yet, the presence of such sensitive data in logs represents a critical security risk that should be addressed promptly. The lack of a patch link suggests that remediation may require upgrading to version 3.3.0 or later, where this logging behavior is presumably corrected.
Potential Impact
For European organizations using Brocade ASCG, this vulnerability poses a significant risk to the confidentiality and integrity of their authentication mechanisms. Unauthorized access via stolen JWTs could lead to data breaches, unauthorized configuration changes, and potential disruption of network services managed by Brocade ASCG. Given that Brocade ASCG is typically used in storage and network infrastructure environments, exploitation could compromise critical infrastructure components, impacting business continuity and regulatory compliance, especially under GDPR where unauthorized data access can lead to heavy fines. The local access requirement means that attackers would need some level of access to the system or network segment where logs are stored, which could be achieved through insider threats or lateral movement after initial compromise. The high privileges required further limit the attack surface but do not eliminate the risk, especially in complex enterprise environments where privilege escalation is possible. The exposure of JWTs in logs could also facilitate further attacks against other integrated systems relying on these tokens for authentication, amplifying the impact.
Mitigation Recommendations
European organizations should immediately audit their Brocade ASCG deployments to identify versions prior to 3.3.0 and plan for an upgrade to version 3.3.0 or later where the vulnerability is resolved. Until upgrades can be applied, organizations should restrict access to log files strictly, implementing strict file permissions and monitoring access logs for suspicious activity. Employing log management solutions that encrypt logs at rest and in transit can reduce the risk of token leakage. Additionally, organizations should consider implementing short-lived JWTs and token revocation mechanisms to limit the window of opportunity for token misuse. Network segmentation and the principle of least privilege should be enforced to minimize the risk of attackers gaining local access with elevated privileges. Regular security audits and monitoring for anomalous authentication patterns can help detect potential exploitation attempts. Finally, organizations should review their incident response plans to include scenarios involving token theft and session hijacking.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- brocade
- Date Reserved
- 2025-06-20T02:59:00.845Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687972a7a83201eaacea64d9
Added to database: 7/17/2025, 10:01:11 PM
Last enriched: 7/17/2025, 10:16:26 PM
Last updated: 7/18/2025, 6:00:41 AM
Views: 4
Related Threats
CVE-2025-7444: CWE-288 Authentication Bypass Using an Alternate Path or Channel in LoginPress LoginPress Pro
CriticalCVE-2025-26855: CWE-89: Improper Neutralization of Special Elements used in an SQL Command in joomcar.net Articles Calendar extension for Joomla
HighCVE-2025-26854: CWE-89: Improper Neutralization of Special Elements used in an SQL Command in joomcar.net Articles Good Search extension for Joomla
HighCVE-2025-7772: CWE-862 Missing Authorization in malcure Malcure Malware Scanner — #1 Toolset for Malware Removal
MediumCVE-2025-7438: CWE-434 Unrestricted Upload of File with Dangerous Type in StylemixThemes MasterStudy LMS Pro
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.