First published: Fri May 06 2022(Updated: )
Brocade SANnav before SANnav 2.2.0 application uses the Blowfish symmetric encryption algorithm for the storage of passwords. This could allow an authenticated attacker to decrypt stored account passwords.
Credit: sirt@brocade.com sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Sannav | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-28164.
The severity of CVE-2022-28164 is medium with a severity value of 6.5.
The Brocade SANnav application before version 2.2.0 is affected by CVE-2022-28164.
CVE-2022-28164 could allow an authenticated attacker to decrypt stored account passwords.
Yes, upgrading to Brocade SANnav version 2.2.0 or later will fix the vulnerability.