First published: Wed Jun 09 2021(Updated: )
Brocade SANnav before version 2.1.1 uses a hard-coded administrator account with the weak password ‘passw0rd’ if a password is not provided for PostgreSQL at install-time.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Brocade Sannav | <2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15382 is a vulnerability in Brocade SANnav, versions up to 2.1.1, that allows an attacker to log in using a hard-coded administrator account with a weak password.
CVE-2020-15382 has a severity score of 7.2 (high).
Brocade SANnav versions up to 2.1.1 are affected by CVE-2020-15382.
To fix CVE-2020-15382, upgrade to Brocade SANnav version 2.1.1 or later.
You can find more information about CVE-2020-15382 in the Brocade Security Advisory available at: https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1484