First published: Fri Apr 19 2024(Updated: )
A vulnerability affects Brocade SANnav before v2.3.1 and v2.3.0a. It allows a Brocade SANnav service to send ping commands in the background at regular intervals to gridgain.com to check if updates are available for the Component. This could make an unauthenticated, remote attacker aware of the behavior and launch a supply-chain attack against a Brocade SANnav appliance.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom SANnav OVA | <2.3.0a | |
Broadcom SANnav OVA | <2.3.1 | |
Broadcom SANnav OVA | =2.3.0a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29961 is considered a high severity vulnerability due to the potential for unauthenticated remote attacks.
To fix CVE-2024-29961, upgrade Brocade SANnav to version 2.3.1 or later.
CVE-2024-29961 affects Brocade SANnav versions prior to 2.3.1 and version 2.3.0a.
Yes, CVE-2024-29961 can be exploited remotely by unauthenticated attackers.
CVE-2024-29961 allows attackers to send ping commands to check for updates, which could lead to further exploitation.