Lucene search

K
vulnrichmentBrocadeVULNRICHMENT:CVE-2024-29966
HistoryApr 19, 2024 - 4:53 a.m.

CVE-2024-29966 hard-coded credentials in the documentation that appear as the appliance root password

2024-04-1904:53:59
CWE-798
brocade
github.com
1
brocade sannav
ova
hard-coded credentials
vulnerability
documentation
appliance root password
unauthenticated attacker
full access

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Brocade SANnav OVA before v2.3.1 and v2.3.0a contain hard-coded credentials in the documentation that appear as the appliance’s root password. The vulnerability could allow an unauthenticated attacker full access to the Brocade SANnav appliance.

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "Brocade SANnav ",
    "vendor": "Brocade",
    "versions": [
      {
        "status": "affected",
        "version": "before v2.3.1 and v2.3.0a"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for VULNRICHMENT:CVE-2024-29966