CVE-2024-10405
- EPSS 0.04%
- Veröffentlicht 15.02.2025 00:15:13
- Zuletzt bearbeitet 26.08.2025 19:44:01
Brocade SANnav before SANnav 2.3.1b enables weak TLS ciphers on ports 443 and 18082. In case of a successful exploit, an attacker can read Brocade SANnav data stream that includes monitored Brocade Fabric OS switches performance data, port status,...
CVE-2024-4282
- EPSS 0.06%
- Veröffentlicht 15.02.2025 00:15:13
- Zuletzt bearbeitet 26.08.2025 19:42:18
Brocade SANnav OVA before SANnav 2.3.1b enables SHA1 deprecated setting for SSH for port 22.
CVE-2024-2240
- EPSS 0.26%
- Veröffentlicht 14.02.2025 05:15:11
- Zuletzt bearbeitet 26.08.2025 19:48:30
Docker daemon in Brocade SANnav before SANnav 2.3.1b runs without auditing. The vulnerability could allow a remote authenticated attacker to execute various attacks.
CVE-2025-1053
- EPSS 0.03%
- Veröffentlicht 14.02.2025 04:15:08
- Zuletzt bearbeitet 26.09.2025 14:03:27
Under certain error conditions at time of SANnav installation or upgrade, the encryption key can be written into and obtained from a Brocade SANnav supportsave. An attacker with privileged access to the Brocade SANnav database could use the encrypti...
CVE-2024-10404
- EPSS 0.01%
- Veröffentlicht 14.02.2025 04:15:07
- Zuletzt bearbeitet 26.08.2025 20:02:17
CalInvocationHandler in Brocade SANnav before 2.3.1b logs sensitive information in clear text. The vulnerability could allow an authenticated, local attacker to view Brocade Fabric OS switch sensitive information in clear text. An attacker with a...
CVE-2024-2859
- EPSS 2.14%
- Veröffentlicht 27.04.2024 00:15:07
- Zuletzt bearbeitet 02.09.2025 18:31:13
By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.
CVE-2022-28161
- EPSS 0.05%
- Veröffentlicht 09.05.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 06:56:52
An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploi...