Products
Brocade SANnav server
- before v2.3.1
- v2.3.0a
Source
sirt@brocade.com
Tags
CVE-2024-29960 details
Published : April 19, 2024, 4:15 a.m.
Last Modified : April 19, 2024, 1:10 p.m.
Last Modified : April 19, 2024, 1:10 p.m.
Description
In the Brocade SANnav server versions before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are hardcoded and identical in the VM every time SANnav is installed. Any Brocade SANnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav appliance.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7.5 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
Base Score
7.5
Exploitability Score
Impact Score
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
References
URL | Source |
---|---|
https://support.broadcom.com/external/content/SecurityAdvisories/0/23244 | sirt@brocade.com |
This website uses the NVD API, but is not approved or certified by it.