First published: Wed Apr 17 2024(Updated: )
Brocade SANnav before v2.3.1 and v2.3.0a uses the SHA-1 hash in internal SSH ports that are not open to remote connection.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom SANnav OVA | <2.3.0a | |
Broadcom SANnav OVA | <2.3.1 | |
Broadcom SANnav OVA | =2.3.0a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29951 is classified as a high severity vulnerability due to the use of the SHA-1 hash algorithm in Brocade SANnav.
To mitigate CVE-2024-29951, upgrade Brocade SANnav to version 2.3.1 or later.
CVE-2024-29951 affects Brocade SANnav versions prior to 2.3.1 and specifically version 2.3.0a.
The impact of CVE-2024-29951 includes potential security risks associated with outdated hashing algorithms.
No, the internal SSH ports affected by CVE-2024-29951 are not open to remote connection.