In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-26939 In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Broadcom
Broadcom brocade Sannav
CPEs cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*
Vendors & Products Broadcom
Broadcom brocade Sannav

cve-icon MITRE

Status: PUBLISHED

Assigner: brocade

Published:

Updated: 2024-08-02T01:17:58.599Z

Reserved: 2024-03-22T05:32:26.687Z

Link: CVE-2024-29965

cve-icon Vulnrichment

Updated: 2024-08-02T01:17:58.599Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-19T05:15:49.390

Modified: 2025-02-04T15:45:17.783

Link: CVE-2024-29965

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.