Show filters
561 Total Results
Displaying 41-50 of 561
Sort by:
Attacker Value
Unknown
CVE-2024-4161
Disclosure Date: April 25, 2024 (last updated February 07, 2025)
In Brocade SANnav, before Brocade SANnav v2.3.0, syslog traffic received
clear text. This could allow an unauthenticated, remote attacker to
capture sensitive information.
0
Attacker Value
Unknown
CVE-2024-4159
Disclosure Date: April 25, 2024 (last updated February 07, 2025)
Brocade SANnav before v2.3.0a lacks protection mechanisms on port 2377/TCP and 7946/TCP, which could allow an unauthenticated attacker to sniff the SANnav Docker information.
0
Attacker Value
Unknown
CVE-2024-29969
Disclosure Date: April 19, 2024 (last updated February 05, 2025)
When a Brocade SANnav installation is upgraded from Brocade SANnav v2.2.2 to Brocade SANnav 2.3.0, TLS/SSL weak message authentication code ciphers are added by default for port 18082.
0
Attacker Value
Unknown
CVE-2024-29968
Disclosure Date: April 19, 2024 (last updated February 05, 2025)
An information disclosure vulnerability exists in Brocade SANnav before v2.3.1 and v2.3.0a when Brocade SANnav instances are configured in disaster recovery mode. SQL Table names, column names, and SQL queries are collected in DR standby Supportsave. This could allow authenticated users to access the database structure and its contents.
0
Attacker Value
Unknown
CVE-2024-29967
Disclosure Date: April 19, 2024 (last updated February 05, 2025)
In Brocade SANnav before Brocade SANnav v2.31 and v2.3.0a, it was observed that Docker instances inside the appliance have insecure mount points, allowing reading and writing access to sensitive files. The vulnerability could allow a sudo privileged user on the host OS to read and write access to these files.
0
Attacker Value
Unknown
CVE-2024-29966
Disclosure Date: April 19, 2024 (last updated February 05, 2025)
Brocade SANnav OVA before v2.3.1 and v2.3.0a contain hard-coded credentials in the documentation that appear as the appliance's root password. The vulnerability could allow an unauthenticated attacker full access to the Brocade SANnav appliance.
0
Attacker Value
Unknown
CVE-2024-29965
Disclosure Date: April 19, 2024 (last updated February 05, 2025)
In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.
0
Attacker Value
Unknown
CVE-2024-29964
Disclosure Date: April 19, 2024 (last updated February 05, 2025)
Brocade SANnav versions before v2.3.0a do not correctly set permissions on files, including docker files. An unprivileged attacker who gains access to the server can read sensitive information from these files.
0
Attacker Value
Unknown
CVE-2024-29962
Disclosure Date: April 19, 2024 (last updated February 05, 2025)
Brocade SANnav OVA before v2.3.1 and v2.3.0a have an insecure file permission setting that makes files world-readable. This could allow a local user without the required privileges to access sensitive information or a Java binary.
0
Attacker Value
Unknown
CVE-2024-29963
Disclosure Date: April 19, 2024 (last updated February 05, 2025)
Brocade SANnav OVA before v2.3.1, and v2.3.0a, contain hardcoded TLS keys used by Docker. Note: Brocade SANnav doesn't have access to remote Docker registries.
0