2024-07-14 02:06:08 +00:00

60 lines
2.2 KiB
JSON

{
"id": "CVE-2024-29961",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-19T04:15:10.553",
"lastModified": "2024-04-19T13:10:25.637",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability affects Brocade SANnav before v2.3.1 and v2.3.0a. It allows a Brocade SANnav service to send ping commands in the background at regular intervals to gridgain.com to check if updates are available for the Component. This could make an unauthenticated, remote attacker aware of the behavior and launch a supply-chain attack against a Brocade SANnav appliance.\n"
},
{
"lang": "es",
"value": "Una vulnerabilidad afecta a Brocade SANnav anterior a v2.3.1 y v2.3.0a. Permite que un servicio Brocade SANnav env\u00ede comandos de ping en segundo plano a intervalos regulares a gridgain.com para verificar si hay actualizaciones disponibles para el Componente. Esto podr\u00eda hacer que un atacante remoto no autenticado se d\u00e9 cuenta del comportamiento y lance un ataque a la cadena de suministro contra un dispositivo Brocade SANnav."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23246",
"source": "sirt@brocade.com"
}
]
}