Filtered by vendor Broadcom Subscriptions
Total 550 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-29963 1 Broadcom 1 Brocade Sannav 2025-02-04 1.9 Low
Brocade SANnav OVA before v2.3.1, and v2.3.0a, contain hardcoded TLS keys used by Docker. Note: Brocade SANnav doesn't have access to remote Docker registries.
CVE-2024-29962 1 Broadcom 1 Brocade Sannav 2025-02-04 5.5 Medium
Brocade SANnav OVA before v2.3.1 and v2.3.0a have an insecure file permission setting that makes files world-readable. This could allow a local user without the required privileges to access sensitive information or a Java binary.
CVE-2024-29964 2 Broadcom, Brocade 2 Brocade Sannav, Sannav 2025-02-04 5.7 Medium
Brocade SANnav versions before v2.3.0a do not correctly set permissions on files, including docker files. An unprivileged attacker who gains access to the server can read sensitive information from these files.
CVE-2024-29965 1 Broadcom 1 Brocade Sannav 2025-02-04 6.8 Medium
In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.
CVE-2024-29966 1 Broadcom 1 Brocade Sannav 2025-02-04 7.5 High
Brocade SANnav OVA before v2.3.1 and v2.3.0a contain hard-coded credentials in the documentation that appear as the appliance's root password. The vulnerability could allow an unauthenticated attacker full access to the Brocade SANnav appliance.
CVE-2024-29967 1 Broadcom 1 Brocade Sannav 2025-02-04 4.4 Medium
In Brocade SANnav before Brocade SANnav v2.31 and v2.3.0a, it was observed that Docker instances inside the appliance have insecure mount points, allowing reading and writing access to sensitive files. The vulnerability could allow a sudo privileged user on the host OS to read and write access to these files.
CVE-2024-29968 1 Broadcom 1 Brocade Sannav 2025-02-04 7.7 High
An information disclosure vulnerability exists in Brocade SANnav before v2.3.1 and v2.3.0a when Brocade SANnav instances are configured in disaster recovery mode. SQL Table names, column names, and SQL queries are collected in DR standby Supportsave. This could allow authenticated users to access the database structure and its contents.
CVE-2024-29969 1 Broadcom 1 Brocade Sannav 2025-02-04 7.5 High
When a Brocade SANnav installation is upgraded from Brocade SANnav v2.2.2 to Brocade SANnav 2.3.0, TLS/SSL weak message authentication code ciphers are added by default for port 18082.
CVE-2024-29950 1 Broadcom 1 Brocade Sannav 2025-02-04 7.5 High
The class FileTransfer implemented in Brocade SANnav before v2.3.1, v2.3.0a, uses the ssh-rsa signature scheme, which has a SHA-1 hash. The vulnerability could allow a remote, unauthenticated attacker to perform a man-in-the-middle attack.
CVE-2023-5973 1 Broadcom 1 Fabric Operating System 2025-02-04 4.3 Medium
Brocade Web Interface in Brocade Fabric OS v9.x and before v9.2.0 does not properly represent the portName to the user if the portName contains reserved characters. This could allow an authenticated user to alter the UI of the Brocade Switch and change ports display.
CVE-2023-3454 1 Broadcom 1 Fabric Operating System 2025-02-04 8.6 High
Remote code execution (RCE) vulnerability in Brocade Fabric OS after v9.0 and before v9.2.0 could allow an attacker to execute arbitrary code and use this to gain root access to the Brocade switch.
CVE-2024-10403 1 Broadcom 1 Fabric Operating System 2025-02-04 7.5 High
Brocade Fabric OS versions before 8.2.3e2, versions 9.0.0 through 9.2.0c, and 9.2.1 through 9.2.1a can capture the SFTP/FTP server password used for a firmware download operation initiated by SANnav or through WebEM in a weblinker core dump that is later captured via supportsave.
CVE-2024-7516 1 Broadcom 1 Fabric Operating System 2025-02-04 7.1 High
A vulnerability in Brocade Fabric OS versions before 9.2.2 could allow man-in-the-middle attackers to conduct remote Service Session Hijacking that may arise from the attacker's ability to forge an SSH key while the Brocade Fabric OS Switch is performing various remote operations initiated by a switch admin.
CVE-2024-5460 1 Broadcom 1 Fabric Operating System 2025-02-04 8.1 High
A vulnerability in the default configuration of the Simple Network Management Protocol (SNMP) feature of Brocade Fabric OS versions before v9.0.0 could allow an authenticated, remote attacker to read data from an affected device via SNMP. The vulnerability is due to hard-coded, default community string in the configuration file for the SNMP daemon. An attacker could exploit this vulnerability by using the static community string in SNMP version 1 queries to an affected device.
CVE-2024-29953 1 Broadcom 1 Fabric Operating System 2025-02-04 4.3 Medium
A vulnerability in the web interface in Brocade Fabric OS before v9.2.1, v9.2.0b, and v9.1.1d prints encoded session passwords on session storage for Virtual Fabric platforms. This could allow an authenticated user to view other users' session encoded passwords.
CVE-2023-23956 1 Broadcom 1 Symantec Siteminder Webagent 2025-01-14 6.1 Medium
A user can supply malicious HTML and JavaScript code that will be executed in the client browser
CVE-2023-23955 1 Broadcom 2 Advanced Secure Gateway, Content Analysis 2025-01-09 8.1 High
Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to a Server-Side Request Forgery vulnerability.
CVE-2023-23954 1 Broadcom 2 Advanced Secure Gateway, Content Analysis 2025-01-09 5.4 Medium
Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to a Stored Cross-Site Scripting vulnerability.
CVE-2023-23953 1 Broadcom 2 Advanced Secure Gateway, Content Analysis 2025-01-09 7.8 High
Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to an Elevation of Privilege vulnerability.
CVE-2023-23952 1 Broadcom 2 Advanced Secure Gateway, Content Analysis 2025-01-09 9.8 Critical
Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to a Command Injection vulnerability.