In Brocade SANnav server before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are identical in the VM every time SANnav is installed. Any Brocade SAnnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav.
References
Link | Resource |
---|---|
https://support.broadcom.com/external/content/SecurityAdvisories/0/23244 | Vendor Advisory |
https://support.broadcom.com/external/content/SecurityAdvisories/0/23244 | Vendor Advisory |
Configurations
History
04 Feb 2025, 15:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:* | |
References | () https://support.broadcom.com/external/content/SecurityAdvisories/0/23244 - Vendor Advisory | |
First Time |
Broadcom brocade Sannav
Broadcom |
Information
Published : 2024-04-19 04:15
Updated : 2025-02-04 15:53
NVD link : CVE-2024-29960
Mitre link : CVE-2024-29960
CVE.ORG link : CVE-2024-29960
JSON object : View
Products Affected
broadcom
- brocade_sannav
CWE
CWE-798
Use of Hard-coded Credentials