First published: Mon Jun 27 2022(Updated: )
In Brocade SANnav before Brocade SANnav v2.2.0.2 and Brocade SANnav2.1.1.8, encoded scp-server passwords are stored using Base64 encoding, which could allow an attacker able to access log files to easily decode the passwords.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Brocade SANnav | <2.1.1.8 | |
Broadcom Brocade SANnav | >=2.2.0.0<2.2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-28168.
The severity of CVE-2022-28168 is high with a CVSS score of 7.5.
Brocade SANnav versions up to and including v2.1.1.8, as well as versions between v2.2.0.0 and v2.2.0.2, are affected by CVE-2022-28168.
The vulnerability allows an attacker with access to log files to easily decode encoded scp-server passwords stored in Base64 format.
To fix CVE-2022-28168, it is recommended to update Brocade SANnav to version v2.2.0.2 or higher.