First published: Wed Apr 17 2024(Updated: )
The class FileTransfer implemented in Brocade SANnav before v2.3.1, v2.3.0a, uses the ssh-rsa signature scheme, which has a SHA-1 hash. The vulnerability could allow a remote, unauthenticated attacker to perform a man-in-the-middle attack.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom SANnav OVA | <2.3.0a | |
Broadcom SANnav OVA | <2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29950 has a high severity rating due to the potential for remote, unauthenticated man-in-the-middle attacks.
To fix CVE-2024-29950, upgrade Brocade SANnav to version 2.3.1 or later.
Brocade SANnav versions prior to 2.3.1 and 2.3.0a are affected by CVE-2024-29950.
CVE-2024-29950 can enable remote, unauthenticated man-in-the-middle attacks.
No, CVE-2024-29950 can be exploited by remote, unauthenticated attackers.