A vulnerability affects Brocade SANnav before v2.3.1 and v2.3.0a. It allows a Brocade SANnav service to send ping commands in the background at regular intervals to gridgain.com to check if updates are available for the Component. This could make an unauthenticated, remote attacker aware of the behavior and launch a supply-chain attack against a Brocade SANnav appliance.
References
Link | Resource |
---|---|
https://support.broadcom.com/external/content/SecurityAdvisories/0/23246 | Vendor Advisory |
https://support.broadcom.com/external/content/SecurityAdvisories/0/23246 | Vendor Advisory |
Configurations
History
04 Feb 2025, 15:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:* | |
References | () https://support.broadcom.com/external/content/SecurityAdvisories/0/23246 - Vendor Advisory | |
CWE | NVD-CWE-noinfo | |
First Time |
Broadcom brocade Sannav
Broadcom |
Information
Published : 2024-04-19 04:15
Updated : 2025-02-04 15:52
NVD link : CVE-2024-29961
Mitre link : CVE-2024-29961
CVE.ORG link : CVE-2024-29961
JSON object : View
Products Affected
broadcom
- brocade_sannav
CWE