First published: Fri Nov 08 2019(Updated: )
Password-based encryption (PBE) algorithm, of Brocade SANnav versions before v2.0, has a weakness in generating cryptographic keys that may allow an attacker to decrypt passwords used with several services (Radius, TACAS, etc.).
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Brocade Sannav | <2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this weakness in Brocade SANnav is CVE-2019-16208.
CVE-2019-16208 has a severity rating of 7.5 (high).
This vulnerability in Brocade SANnav versions before v2.0 affects the password-based encryption (PBE) algorithm used for generating cryptographic keys, which may allow an attacker to decrypt passwords used with several services (Radius, TACAS, etc.).
Brocade SANnav versions before v2.0 are affected by CVE-2019-16208.
It is recommended to update Brocade SANnav to version 2.0 or later to mitigate the vulnerability.