In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-26939 | In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom brocade Sannav |
|
| CPEs | cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Broadcom
Broadcom brocade Sannav |
Status: PUBLISHED
Assigner: brocade
Published:
Updated: 2024-08-02T01:17:58.599Z
Reserved: 2024-03-22T05:32:26.687Z
Link: CVE-2024-29965
Updated: 2024-08-02T01:17:58.599Z
Status : Analyzed
Published: 2024-04-19T05:15:49.390
Modified: 2025-02-04T15:45:17.783
Link: CVE-2024-29965
No data.
OpenCVE Enrichment
No data.
EUVD