In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom brocade Sannav |
|
| CPEs | cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Broadcom
Broadcom brocade Sannav |
Status: PUBLISHED
Assigner: brocade
Published: 2024-04-19T04:48:46.279Z
Updated: 2024-08-02T01:17:58.599Z
Reserved: 2024-03-22T05:32:26.687Z
Link: CVE-2024-29965
Updated: 2024-08-02T01:17:58.599Z
Status : Analyzed
Published: 2024-04-19T05:15:49.390
Modified: 2025-02-04T15:45:17.783
Link: CVE-2024-29965
No data.