First published: Fri Apr 19 2024(Updated: )
When a Brocade SANnav installation is upgraded from Brocade SANnav v2.2.2 to Brocade SANnav 2.3.0, TLS/SSL weak message authentication code ciphers are added by default for port 18082.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom SANnav OVA | >=2.2.2<2.3.0a | |
Broadcom SANnav OVA | >2.2.2<=2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29969 has a medium severity rating due to the introduction of weak TLS/SSL ciphers.
To fix CVE-2024-29969, you should disable the weak message authentication code ciphers for port 18082 in Brocade SANnav.
Brocade SANnav versions between 2.2.2 and 2.3.0 are affected by CVE-2024-29969.
CVE-2024-29969 introduces vulnerabilities related to weak message authentication code ciphers that can be exploited for unauthorized access.
Currently, the recommended workaround for CVE-2024-29969 is to manually configure secure ciphers and settings in Brocade SANnav.