Description
In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-26939 | In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches. |
References
History
Tue, 04 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom brocade Sannav |
|
| CPEs | cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Broadcom
Broadcom brocade Sannav |
Status: PUBLISHED
Assigner: brocade
Published:
Updated: 2024-08-02T01:17:58.599Z
Reserved: 2024-03-22T05:32:26.687Z
Link: CVE-2024-29965
Updated: 2024-08-02T01:17:58.599Z
Status : Analyzed
Published: 2024-04-19T05:15:49.390
Modified: 2025-02-04T15:45:17.783
Link: CVE-2024-29965
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD