First published: Mon May 09 2022(Updated: )
Brocade SANnav before version SANnav 2.2.0 logs the REST API Authentication token in plain text.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Sannav | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-28162.
The severity of CVE-2022-28162 is low, with a severity value of 3.3.
The affected software is Brocade SANnav versions up to 2.2.0.
CVE-2022-28162 allows the REST API Authentication token to be logged in plain text in Brocade SANnav.
Yes, an upgrade to Brocade SANnav version 2.2.0 or higher will fix the vulnerability.
You can find more information about CVE-2022-28162 in the Brocade Security Advisory 2022-1841: https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1841