René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

168 lines
5.9 KiB
JSON

{
"id": "CVE-2020-15387",
"sourceIdentifier": "sirt@brocade.com",
"published": "2021-06-09T16:15:08.307",
"lastModified": "2021-08-23T14:47:23.153",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The host SSH servers of Brocade Fabric OS before Brocade Fabric OS v7.4.2h, v8.2.1c, v8.2.2, v9.0.0, and Brocade SANnav before v2.1.1 utilize keys of less than 2048 bits, which may be vulnerable to man-in-the-middle attacks and/or insecure SSH communications."
},
{
"lang": "es",
"value": "Los servidores SSH del host de Brocade Fabric OS versiones anteriores a v7.4.2h, v8.2.1c, v8.2.2, v9.0.0, y Brocade SANnav versiones anteriores a v2.1.1, utilizan claves de menos de 2048 bits, que pueden ser vulnerables a ataques de tipo man-in-the-middle y/o a comunicaciones SSH no seguras"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1.1",
"matchCriteriaId": "F078016A-D256-4A68-9C65-DF23B6858158"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.4.2",
"matchCriteriaId": "31DFB192-EA22-4604-85ED-0A34E0DBF384"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndExcluding": "8.2.1",
"matchCriteriaId": "CD800AD8-1792-4D0B-BE9C-FDCE1BF6BE31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2FEAE07D-906E-4B7C-B577-14D15CFFB69C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:7.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "8A589310-66AB-4D4F-A332-64E245AB1D0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:7.4.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "F633FD3F-8224-4D96-BD0C-55EA218D4364"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:7.4.2c:*:*:*:*:*:*:*",
"matchCriteriaId": "656001D2-F17B-49C0-9F38-E84B5CE3E088"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:7.4.2d:*:*:*:*:*:*:*",
"matchCriteriaId": "9761DF12-141D-4109-805D-449B5495ACB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:7.4.2f:*:*:*:*:*:*:*",
"matchCriteriaId": "DD207CDF-7BF9-4FBD-86C4-C24B66D219FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:7.4.2g:*:*:*:*:*:*:*",
"matchCriteriaId": "518C9470-B56D-4B6C-99F9-20DEB3F86BBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C91FB6C-7BF5-453E-A618-06756D3DD2FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7CF38E78-8243-4615-A8A1-1396920F5BA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:8.2.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "84E4F075-D03B-4D98-8C9E-840D80DFFF48"
}
]
}
]
}
],
"references": [
{
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1291",
"source": "sirt@brocade.com",
"tags": [
"Vendor Advisory"
]
}
]
}