Broadcom

Sannav

15 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Published 27.06.2022 18:15:08
  • Last modified 21.11.2024 06:56:52

In Brocade SANnav version before SANN2.2.0.2 and Brocade SANNav before 2.1.1.8, the implementation of TLS/SSL Server Supports the Use of Static Key Ciphers (ssl-static-key-ciphers) on ports 443 & 18082.

  • EPSS 0.22%
  • Published 27.06.2022 18:15:08
  • Last modified 21.11.2024 06:56:53

Brocade SANnav before Brocade SANvav v. 2.2.0.2 and Brocade SANanv v.2.1.1.8 logs the Brocade Fabric OS switch password in plain text in asyncjobscheduler-manager.log

  • EPSS 0.32%
  • Published 27.06.2022 18:15:08
  • Last modified 21.11.2024 06:56:53

In Brocade SANnav before Brocade SANnav v2.2.0.2 and Brocade SANnav2.1.1.8, encoded scp-server passwords are stored using Base64 encoding, which could allow an attacker able to access log files to easily decode the passwords.

  • EPSS 25.23%
  • Published 21.06.2022 15:15:09
  • Last modified 15.09.2025 14:15:33

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022...

  • EPSS 0.02%
  • Published 09.05.2022 17:15:09
  • Last modified 21.11.2024 06:56:52

Brocade SANnav before version SANnav 2.2.0 logs the REST API Authentication token in plain text.

  • EPSS 0.76%
  • Published 06.05.2022 17:15:09
  • Last modified 21.11.2024 06:56:52

A vulnerability in the role-based access control (RBAC) functionality of the Brocade SANNav before 2.2.0 could allow an authenticated, remote attacker to access resources that they should not be able to access and perform actions that they should not...

  • EPSS 0.61%
  • Published 06.05.2022 16:15:14
  • Last modified 21.11.2024 06:56:52

In Brocade SANnav before Brocade SANnav 2.2.0, multiple endpoints associated with Zone management are susceptible to SQL injection, allowing an attacker to run arbitrary SQL commands.

  • EPSS 0.09%
  • Published 06.05.2022 16:15:14
  • Last modified 21.11.2024 06:56:52

Brocade SANnav before SANnav 2.2.0 application uses the Blowfish symmetric encryption algorithm for the storage of passwords. This could allow an authenticated attacker to decrypt stored account passwords.

  • EPSS 0.55%
  • Published 09.06.2021 16:15:08
  • Last modified 21.11.2024 05:05:26

Webtools in Brocade SANnav before version 2.1.1 allows unauthenticated users to make requests to arbitrary hosts due to a misconfiguration; this is commonly referred to as Server-Side Request Forgery (SSRF).

  • EPSS 0.24%
  • Published 09.06.2021 16:15:08
  • Last modified 21.11.2024 05:05:26

The OVA version of Brocade SANnav before version 2.1.1 installation with IPv6 networking exposes the docker container ports to the network, increasing the potential attack surface.