cvelist/2024/29xxx/CVE-2024-29957.json

96 lines
3.3 KiB
JSON
Raw Normal View History

2024-04-02 14:13:38 +00:00
{
2024-04-19 04:00:33 +00:00
"data_version": "4.0",
2024-04-02 14:13:38 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-29957",
2024-04-19 04:00:33 +00:00
"ASSIGNER": "sirt@brocade.com",
"STATE": "PUBLIC"
2024-04-02 14:13:38 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-04-19 04:00:33 +00:00
"value": "When Brocade SANnav before v2.3.1 and v2.3.0a servers are configured in Disaster Recovery mode, the encryption key is stored in the DR log files. This could provide attackers with an additional, less-protected path to acquiring the encryption key.\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-532: Insertion of Sensitive Information into Log File",
"cweId": "CWE-532"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Brocade",
"product": {
"product_data": [
{
"product_name": "Brocade SANnav",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "affected",
"version": "before v2.3.1 and v2.3.0a"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23241",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23241"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
2024-04-02 14:13:38 +00:00
}
]
}
}