cvelist/2024/7xxx/CVE-2024-7516.json

78 lines
2.8 KiB
JSON
Raw Normal View History

2024-08-05 23:00:36 +00:00
{
2024-11-12 19:00:34 +00:00
"data_version": "4.0",
2024-08-05 23:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-7516",
2024-11-12 19:00:34 +00:00
"ASSIGNER": "sirt@brocade.com",
"STATE": "PUBLIC"
2024-08-05 23:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-11-12 19:00:34 +00:00
"value": "A vulnerability in Brocade Fabric OS versions before 9.2.2 could allow man-in-the-middle attackers to conduct remote Service Session Hijacking that may arise from the attacker's ability to forge an SSH key while the Brocade Fabric OS Switch is performing various remote operations initiated by a switch admin."
2024-08-05 23:00:36 +00:00
}
]
2024-11-12 19:00:34 +00:00
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-322: Key Exchange without Entity Authentication",
"cweId": "CWE-322"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Brocade",
"product": {
"product_data": [
{
"product_name": "Fabric OS",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "affected",
"version": "before 9.2.2"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25177",
"refsource": "MISC",
"name": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25177"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
2024-08-05 23:00:36 +00:00
}
}