First published: Thu Apr 25 2024(Updated: )
In Brocade SANnav, before Brocade SANnav v2.3.0, syslog traffic received clear text. This could allow an unauthenticated, remote attacker to capture sensitive information.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom SANnav OVA | <2.3.0 | |
Broadcom SANnav OVA | <2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4161 is considered a high severity vulnerability due to its potential for unauthorized data capture.
To fix CVE-2024-4161, upgrade Brocade SANnav to version 2.3.0 or later.
CVE-2024-4161 exposes sensitive information transmitted via clear text syslog traffic.
Organizations using Brocade SANnav versions prior to 2.3.0 are affected by CVE-2024-4161.
Yes, CVE-2024-4161 can be exploited remotely by an unauthenticated attacker.