CVE-2024-2859

By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.
Configurations

No configuration.

History

19 Mar 2025, 19:15

Type Values Removed Values Added
CWE CWE-276

21 Feb 2025, 17:15

Type Values Removed Values Added
Summary (en) By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account. (en) By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.
CWE CWE-269

Information

Published : 2024-04-27 00:15

Updated : 2025-03-19 19:15


NVD link : CVE-2024-2859

Mitre link : CVE-2024-2859

CVE.ORG link : CVE-2024-2859


JSON object : View

Products Affected

No product.

CWE
CWE-276

Incorrect Default Permissions