First published: Wed Apr 17 2024(Updated: )
A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a could allow an authenticated user to print the Auth, Priv, and SSL key store passwords in unencrypted logs by manipulating command variables.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom SANnav OVA | <2.3.0a | |
Broadcom SANnav OVA | <2.3.1 | |
Broadcom SANnav OVA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29952 is considered a medium severity vulnerability due to the risk of exposing sensitive passwords in unencrypted logs.
To fix CVE-2024-29952, update Brocade SANnav to version 2.3.1 or later.
CVE-2024-29952 affects all versions of Brocade SANnav before 2.3.1 and 2.3.0a.
CVE-2024-29952 can expose Auth, Priv, and SSL key store passwords in unencrypted logs.
CVE-2024-29952 requires an authenticated user to exploit the vulnerability, meaning remote exploitation is not possible without valid credentials.