First published: Fri Nov 08 2019(Updated: )
A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Brocade Sannav | <2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16205 is a vulnerability in Brocade SANnav versions before v2.0 that allows remote attackers to brute-force a valid session ID.
CVE-2019-16205 has a severity rating of 8.8 (high).
CVE-2019-16205 affects Brocade SANnav versions before v2.0 by allowing remote attackers to brute-force a valid session ID.
To mitigate CVE-2019-16205, users should upgrade to Brocade SANnav version 2.0 or later.
More information about CVE-2019-16205 can be found at the following link: [Brocade Security Advisory 2019-864](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-864)