Description

In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.

Published: 2024-04-19
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-26939 In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.
History

Tue, 04 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Broadcom
Broadcom brocade Sannav
CPEs cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*
Vendors & Products Broadcom
Broadcom brocade Sannav

Subscriptions

Broadcom Brocade Sannav
cve-icon MITRE

Status: PUBLISHED

Assigner: brocade

Published:

Updated: 2024-08-02T01:17:58.599Z

Reserved: 2024-03-22T05:32:26.687Z

Link: CVE-2024-29965

cve-icon Vulnrichment

Updated: 2024-08-02T01:17:58.599Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-19T05:15:49.390

Modified: 2025-02-04T15:45:17.783

Link: CVE-2024-29965

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses