First published: Fri Feb 14 2025(Updated: )
CalInvocationHandler in Brocade SANnav before 2.3.1b logs sensitive information in clear text. The vulnerability could allow an authenticated, local attacker to view Brocade Fabric OS switch sensitive information in clear text. An attacker with administrative privileges could retrieve sensitive information including passwords; SNMP responses that contain AuthSecret and PrivSecret after collecting a “supportsave” or getting access to an already collected “supportsave”. NOTE: this issue exists because of an incomplete fix for CVE-2024-29952
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom SANnav OVA | <2.3.1b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10404 is classified as a high severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2024-10404, upgrade Brocade SANnav to a version later than 2.3.1b, where the vulnerability has been addressed.
CVE-2024-10404 affects users of Brocade SANnav versions up to and including 2.3.1b.
CVE-2024-10404 exposes sensitive information in clear text, including potential sensitive logs.
No, CVE-2024-10404 requires authentication; only authenticated local attackers can exploit the vulnerability.