First published: Tue Jun 25 2024(Updated: )
A vulnerability in the default configuration of the Simple Network Management Protocol (SNMP) feature of Brocade Fabric OS versions before v9.0.0 could allow an authenticated, remote attacker to read data from an affected device via SNMP. The vulnerability is due to hard-coded, default community string in the configuration file for the SNMP daemon. An attacker could exploit this vulnerability by using the static community string in SNMP version 1 queries to an affected device.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Brocade FABRIC OS (FOS) | <9.0.0 | |
broadcom fabric operating system | <9.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-5460 is considered to be high, as it allows authenticated remote attackers to read sensitive data via SNMP.
To fix CVE-2024-5460, update your Brocade Fabric OS to version 9.0.0 or later and review SNMP configurations for proper security settings.
Brocade Fabric OS versions before 9.0.0 are affected by CVE-2024-5460.
CVE-2024-5460 enables authenticated remote attackers to exploit the vulnerability to read data from the affected device.
Yes, CVE-2024-5460 is easily exploitable due to its default configuration and the reliance on hard-coded settings.