CVE-2024-29965

In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.
Configurations

Configuration 1 (hide)

cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*

History

04 Feb 2025, 15:45

Type Values Removed Values Added
First Time Broadcom brocade Sannav
Broadcom
CPE cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*
References () https://support.broadcom.com/external/content/SecurityAdvisories/0/23250 - () https://support.broadcom.com/external/content/SecurityAdvisories/0/23250 - Vendor Advisory

Information

Published : 2024-04-19 05:15

Updated : 2025-02-04 15:45


NVD link : CVE-2024-29965

Mitre link : CVE-2024-29965

CVE.ORG link : CVE-2024-29965


JSON object : View

Products Affected

broadcom

  • brocade_sannav
CWE
CWE-922

Insecure Storage of Sensitive Information