2024-07-14 02:06:08 +00:00

60 lines
2.0 KiB
JSON

{
"id": "CVE-2024-29958",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-19T04:15:09.653",
"lastModified": "2024-04-19T13:10:25.637",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints the encryption key in the console when a privileged user executes the script to replace the Brocade SANnav Management Portal standby node. This could provide attackers an additional, less protected path to acquiring the encryption key.\n"
},
{
"lang": "es",
"value": "Una vulnerabilidad en Brocade SANnav anterior a v2.3.1 y v2.3.0a imprime la clave de cifrado en la consola cuando un usuario privilegiado ejecuta el script para reemplazar el nodo en espera del Portal de administraci\u00f3n de Brocade SANnav. Esto podr\u00eda proporcionar a los atacantes una ruta adicional y menos protegida para adquirir la clave de cifrado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23242",
"source": "sirt@brocade.com"
}
]
}