2024-07-14 02:06:08 +00:00

60 lines
1.9 KiB
JSON

{
"id": "CVE-2024-29957",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-19T04:15:09.390",
"lastModified": "2024-04-19T13:10:25.637",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When Brocade SANnav before v2.3.1 and v2.3.0a servers are configured in Disaster Recovery mode, the encryption key is stored in the DR log files. This could provide attackers with an additional, less-protected path to acquiring the encryption key.\n"
},
{
"lang": "es",
"value": "Cuando los servidores Brocade SANnav anteriores a v2.3.1 y v2.3.0a est\u00e1n configurados en modo de recuperaci\u00f3n de desastres, la clave de cifrado se almacena en los archivos de registro de recuperaci\u00f3n ante desastres. Esto podr\u00eda proporcionar a los atacantes una ruta adicional y menos protegida para adquirir la clave de cifrado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23241",
"source": "sirt@brocade.com"
}
]
}