{"vulnerability": "CVE-2022-28170", "sightings": [{"uuid": "848ab1b5-65a8-40d0-810b-523e77bb0df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28170", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15776", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-28170\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Brocade Fabric OS Web Application services before Brocade Fabric v9.1.0, v9.0.1e, v8.2.3c, v7.4.2j store server and user passwords in the debug statements. This could allow a local user to extract the passwords from a debug file.\n\ud83d\udccf Published: 2022-10-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-09T16:56:22.036Z\n\ud83d\udd17 References:\n1. https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2076\n2. https://security.netapp.com/advisory/ntap-20230127-0002/", "creation_timestamp": "2025-05-09T17:25:38.000000Z"}, {"uuid": "b920d707-d199-4cd7-9b9f-0c9f5f183b71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28170", "type": "seen", "source": "https://t.me/cibsecurity/52083", "content": "\u203c CVE-2022-28170 \u203c\n\nBrocade Fabric OS Web Application services before Brocade Fabric v9.1.0, v9.0.1e, v8.2.3c, v7.4.2j store server and user passwords in the debug statements. This could allow a local user to extract the passwords from a debug file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-26T00:27:02.000000Z"}]}