In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Broadcom
Broadcom brocade Sannav |
|
CPEs | cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:* | |
Vendors & Products |
Broadcom
Broadcom brocade Sannav |

Status: PUBLISHED
Assigner: brocade
Published:
Updated: 2024-08-02T01:17:58.599Z
Reserved: 2024-03-22T05:32:26.687Z
Link: CVE-2024-29965

Updated: 2024-08-02T01:17:58.599Z

Status : Analyzed
Published: 2024-04-19T05:15:49.390
Modified: 2025-02-04T15:45:17.783
Link: CVE-2024-29965

No data.