2024-09-18 23:58:16 +00:00

60 lines
2.1 KiB
JSON

{
"id": "CVE-2024-29964",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-19T05:15:49.217",
"lastModified": "2024-09-18T23:15:11.307",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Brocade SANnav versions before v2.3.0a do not correctly set permissions on files, including docker files. An unprivileged attacker who gains access to the server can read sensitive information from these files."
},
{
"lang": "es",
"value": "Las instancias de Docker en Brocade SANnav anteriores a v2.3.1 y v2.3.0a tienen una arquitectura y configuraci\u00f3n inseguras que generan m\u00faltiples vulnerabilidades. Los demonios de Docker est\u00e1n expuestos a la interfaz WAN y otras vulnerabilidades permiten un control total sobre el dispositivo Ova. Una instancia de Docker podr\u00eda acceder a cualquier otra instancia y algunas podr\u00edan acceder a archivos confidenciales. La vulnerabilidad podr\u00eda permitir que un usuario con privilegios sudo en el sistema operativo subyacente acceda y modifique estos archivos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23249",
"source": "sirt@brocade.com"
}
]
}