Show filters
67 Total Results
Displaying 11-20 of 67
Sort by:
Attacker Value
Unknown

CVE-2022-43933

Disclosure Date: November 21, 2024 (last updated February 05, 2025)
An information exposure through log file vulnerability exists in Brocade SANnav before Brocade SANnav 2.2.2, where configuration secrets are logged in supportsave. Supportsave file is generated by an admin user troubleshooting the switch. The Logged information may include usernames and passwords, and secret keys.
Attacker Value
Unknown

CVE-2024-3596

Disclosure Date: July 09, 2024 (last updated January 07, 2025)
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Attacker Value
Unknown

CVE-2024-2860

Disclosure Date: May 08, 2024 (last updated February 07, 2025)
The PostgreSQL implementation in Brocade SANnav versions before 2.3.0a is vulnerable to an incorrect local authentication flaw. An attacker accessing the VM where the Brocade SANnav is installed can gain access to sensitive data inside the PostgreSQL database.
Attacker Value
Unknown

CVE-2024-2859

Disclosure Date: April 27, 2024 (last updated April 27, 2024)
By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.
0
Attacker Value
Unknown

CVE-2024-4173

Disclosure Date: April 25, 2024 (last updated February 07, 2025)
A vulnerability in Brocade SANnav exposes Kafka in the wan interface. The vulnerability could allow an unauthenticated attacker to perform various attacks, including DOS against the Brocade SANnav.
Attacker Value
Unknown

CVE-2024-4161

Disclosure Date: April 25, 2024 (last updated February 07, 2025)
In Brocade SANnav, before Brocade SANnav v2.3.0, syslog traffic received clear text. This could allow an unauthenticated, remote attacker to capture sensitive information.
Attacker Value
Unknown

CVE-2024-4159

Disclosure Date: April 25, 2024 (last updated February 07, 2025)
Brocade SANnav before v2.3.0a lacks protection mechanisms on port 2377/TCP and 7946/TCP, which could allow an unauthenticated attacker to sniff the SANnav Docker information.
Attacker Value
Unknown

CVE-2024-29969

Disclosure Date: April 19, 2024 (last updated February 05, 2025)
When a Brocade SANnav installation is upgraded from Brocade SANnav v2.2.2 to Brocade SANnav 2.3.0, TLS/SSL weak message authentication code ciphers are added by default for port 18082.
Attacker Value
Unknown

CVE-2024-29968

Disclosure Date: April 19, 2024 (last updated February 05, 2025)
An information disclosure vulnerability exists in Brocade SANnav before v2.3.1 and v2.3.0a when Brocade SANnav instances are configured in disaster recovery mode. SQL Table names, column names, and SQL queries are collected in DR standby Supportsave. This could allow authenticated users to access the database structure and its contents.
Attacker Value
Unknown

CVE-2024-29967

Disclosure Date: April 19, 2024 (last updated February 05, 2025)
In Brocade SANnav before Brocade SANnav v2.31 and v2.3.0a, it was observed that Docker instances inside the appliance have insecure mount points, allowing reading and writing access to sensitive files. The vulnerability could allow a sudo privileged user on the host OS to read and write access to these files.