First published: Sat Apr 27 2024(Updated: )
By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
NetApp SANnav OVA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2859 is considered a high severity vulnerability due to the risks of remote access through the root user account.
To fix CVE-2024-2859, disable root user login in the SANnav OVA settings and implement strong access controls.
CVE-2024-2859 affects the Broadcom SANnav OVA software.
The potential impacts of CVE-2024-2859 include unauthorized access and control of the SANnav system by remote attackers.
A temporary workaround for CVE-2024-2859 is to restrict access to the root account by changing passwords and monitoring access logs.