By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.
References
Link | Resource |
---|---|
https://security.netapp.com/advisory/ntap-20240628-0003/ | Third Party Advisory |
https://support.broadcom.com/external/content/SecurityAdvisories/0/23245 | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20240628-0003/ | Third Party Advisory |
https://support.broadcom.com/external/content/SecurityAdvisories/0/23245 | Vendor Advisory |
Configurations
History
02 Sep 2025, 18:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.netapp.com/advisory/ntap-20240628-0003/ - Third Party Advisory | |
References | () https://support.broadcom.com/external/content/SecurityAdvisories/0/23245 - Vendor Advisory | |
First Time |
Broadcom
Broadcom brocade Sannav |
|
CPE | cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:* |
19 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-276 |
21 Feb 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account. | |
CWE |
Information
Published : 2024-04-27 00:15
Updated : 2025-09-02 18:31
NVD link : CVE-2024-2859
Mitre link : CVE-2024-2859
CVE.ORG link : CVE-2024-2859
JSON object : View
Products Affected
broadcom
- brocade_sannav
CWE
CWE-276
Incorrect Default Permissions