📦 Brocade Sannav
by Broadcom
🔍 What is Brocade Sannav?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows attackers to perform man-in-the-middle attacks against SSH connections to Brocade SANnav OVA appliances by exploiting the use of deprecated SHA1 cryptographic hashing. Organi...
CVE-2024-3596 allows a local attacker to forge RADIUS protocol responses by exploiting MD5 collisions, enabling them to modify authentication outcomes. This affects any system using RADIUS under RFC 2...
CVE-2022-23305 is an SQL injection vulnerability in Log4j 1.2.x's JDBCAppender that allows attackers to execute arbitrary SQL queries by injecting malicious strings into application inputs that get lo...
The Docker daemon in Brocade SANnav management software versions before 2.3.1b runs without auditing enabled. This allows remote authenticated attackers to execute various attacks without detection. O...
This vulnerability exposes Kafka services on the WAN interface of Brocade SANnav management software, allowing unauthenticated attackers to perform denial-of-service attacks. Organizations using Broca...
Brocade SANnav versions before 2.3.0 transmit syslog traffic in clear text without encryption. This allows unauthenticated remote attackers to intercept and capture sensitive information from network ...
An information disclosure vulnerability in Brocade SANnav allows authenticated users to access database structure and contents when configured in disaster recovery mode. SQL table names, column names,...
CVE-2024-29966 is a vulnerability in Brocade SANnav OVA appliances where hard-coded root credentials are documented, allowing unauthenticated attackers to gain full administrative access. This affects...
This vulnerability in Brocade SANnav management software exposes encrypted switch passwords in support save files from standby nodes. Attackers with access to these files could potentially decrypt pas...
This vulnerability affects Brocade SANnav management software versions before v2.3.1 and v2.3.0a. It allows unauthenticated remote attackers to detect the presence of vulnerable systems through backgr...
Brocade SANnav servers configured in Disaster Recovery mode store encryption keys in DR log files, creating an additional attack surface. Attackers who gain access to these log files could obtain encr...
CVE-2024-29950 is a cryptographic vulnerability in Brocade SANnav's FileTransfer class that uses the deprecated ssh-rsa signature scheme with SHA-1 hashing. This allows remote, unauthenticated attacke...
This vulnerability allows remote unauthenticated attackers to bypass authentication and authorization mechanisms in Brocade SANnav's web interface. Affected systems are Brocade SANnav deployments with...
This vulnerability in Brocade SANnav allows remote attackers to cause a denial-of-service condition by sending specially crafted data with excessive length for custom field names. The lack of proper i...
This vulnerability affects Brocade Fabric OS and SANnav systems using SSH host keys shorter than 2048 bits, making SSH communications vulnerable to man-in-the-middle attacks. Attackers could intercept...
This vulnerability allows attackers to gain administrative access to Brocade SANnav's PostgreSQL database using a hard-coded weak password ('passw0rd') when no password was set during installation. Th...
Brocade SANnav versions before 2.4.0a log passwords and PBE keys in local server audit logs under specific conditions. This allows server administrators (but not SANnav users) to potentially access se...
Brocade SANnav versions before 2.3.1b enable weak TLS ciphers on ports 443 and 18082, allowing attackers to intercept and read network traffic containing switch performance data, zoning information, a...
During SANnav installation or upgrade error conditions, the encryption key can be written to and retrieved from a supportsave file. Attackers with privileged database access could use this key to decr...
Brocade SANnav versions before 2.3.1b log sensitive information like passwords and SNMP secrets in clear text. This allows authenticated local attackers with administrative privileges to retrieve sens...
Brocade SANnav versions before 2.2.2 log switch passwords in plaintext when debugging is enabled. This allows attackers with access to logs to obtain credentials for Brocade Fabric OS switches. Organi...
Brocade SANnav management software versions before 2.2.2 support weak key exchange algorithms on multiple ports, allowing attackers to potentially decrypt or manipulate encrypted communications. This ...