Description
An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-32615 | An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode. |
References
History
No history.
Status: PUBLISHED
Assigner: brocade
Published:
Updated: 2024-08-03T05:48:37.343Z
Reserved: 2022-03-29T00:00:00.000Z
Link: CVE-2022-28161
No data.
Status : Modified
Published: 2022-05-09T17:15:09.177
Modified: 2024-11-21T06:56:52.357
Link: CVE-2022-28161
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD