Broadcom

Sannav

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 03.02.2026 02:16:06
  • Zuletzt bearbeitet 03.03.2026 00:58:31

A vulnerability in the migration script for Brocade SANnav before 3.0 could allow the collection of database sql queries in the SANnav support save file. An attacker with access to Brocade SANnav supportsave file, could open the file and then obtain...

  • EPSS 0.02%
  • Veröffentlicht 03.02.2026 01:15:57
  • Zuletzt bearbeitet 03.03.2026 00:59:32

A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a could allow the collection of SANnav database password in the system audit logs. The vulnerability could allow a remote authenticated attacker with ac...

  • EPSS 0.01%
  • Veröffentlicht 02.02.2026 23:15:58
  • Zuletzt bearbeitet 09.02.2026 16:12:42

Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support save logs. When OOM occurs on a Brocade SANnav server, the call stack trace for the Brocade switch is also collected in the heap dump file which cont...

  • EPSS 0.01%
  • Veröffentlicht 02.02.2026 23:15:58
  • Zuletzt bearbeitet 03.03.2026 01:02:34

Brocade SANnav before Brocade SANnav 2.4.0b logs database passwords in clear text in the standby SANnav server, after disaster recovery failover. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the S...

  • EPSS 0.01%
  • Veröffentlicht 02.02.2026 23:15:58
  • Zuletzt bearbeitet 03.03.2026 01:05:08

A vulnerability in Brocade SANnav before 2.4.0b prints the Password-Based Encryption (PBE) key in plaintext in the system audit log file. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the pbe...

  • EPSS 0.32%
  • Veröffentlicht 27.06.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:56:53

In Brocade SANnav before Brocade SANnav v2.2.0.2 and Brocade SANnav2.1.1.8, encoded scp-server passwords are stored using Base64 encoding, which could allow an attacker able to access log files to easily decode the passwords.

  • EPSS 0.22%
  • Veröffentlicht 27.06.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:56:53

Brocade SANnav before Brocade SANvav v. 2.2.0.2 and Brocade SANanv v.2.1.1.8 logs the Brocade Fabric OS switch password in plain text in asyncjobscheduler-manager.log

  • EPSS 0.14%
  • Veröffentlicht 27.06.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:56:52

In Brocade SANnav version before SANN2.2.0.2 and Brocade SANNav before 2.1.1.8, the implementation of TLS/SSL Server Supports the Use of Static Key Ciphers (ssl-static-key-ciphers) on ports 443 & 18082.

  • EPSS 18.75%
  • Veröffentlicht 21.06.2022 15:15:09
  • Zuletzt bearbeitet 03.11.2025 22:15:58

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022...

  • EPSS 0.02%
  • Veröffentlicht 09.05.2022 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:56:52

Brocade SANnav before version SANnav 2.2.0 logs the REST API Authentication token in plain text.