First published: Fri May 06 2022(Updated: )
A vulnerability in the role-based access control (RBAC) functionality of the Brocade SANNav before 2.2.0 could allow an authenticated, remote attacker to access resources that they should not be able to access and perform actions that they should not be able to perform. The vulnerability exists because restrictions are not performed on Server side to ensure the user has required permission before processing requests.
Credit: sirt@brocade.com sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Sannav | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28165 is a vulnerability in the role-based access control (RBAC) functionality of Brocade SANNav before version 2.2.0.
CVE-2022-28165 allows an authenticated remote attacker to access resources and perform actions that they should not be able to.
CVE-2022-28165 has a severity rating of 8.8 (high).
To fix CVE-2022-28165, update to Brocade SANNav version 2.2.0 or later.
More information about CVE-2022-28165 can be found at the following link: [https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1844](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1844)