8.1
CWE
798
EPSS
0.043%
Advisory Published
Updated

CVE-2024-5460: Brocade Fabric OS versions prior to v9.0 have default community strings

First published: Tue Jun 25 2024(Updated: )

A vulnerability in the default configuration of the Simple Network Management Protocol (SNMP) feature of Brocade Fabric OS versions before v9.0.0 could allow an authenticated, remote attacker to read data from an affected device via SNMP. The vulnerability is due to hard-coded, default community string in the configuration file for the SNMP daemon. An attacker could exploit this vulnerability by using the static community string in SNMP version 1 queries to an affected device.

Credit: sirt@brocade.com

Affected SoftwareAffected VersionHow to fix
Brocade FABRIC OS (FOS)<9.0.0
Broadcom Fabric Operating System<9.0.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-5460?

    The severity of CVE-2024-5460 is considered to be high, as it allows authenticated remote attackers to read sensitive data via SNMP.

  • How do I fix CVE-2024-5460?

    To fix CVE-2024-5460, update your Brocade Fabric OS to version 9.0.0 or later and review SNMP configurations for proper security settings.

  • What versions of Brocade Fabric OS are affected by CVE-2024-5460?

    Brocade Fabric OS versions before 9.0.0 are affected by CVE-2024-5460.

  • What type of attack does CVE-2024-5460 enable?

    CVE-2024-5460 enables authenticated remote attackers to exploit the vulnerability to read data from the affected device.

  • Is the vulnerability in CVE-2024-5460 easily exploitable?

    Yes, CVE-2024-5460 is easily exploitable due to its default configuration and the reliance on hard-coded settings.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203