Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hjff-8jgj-64p3

Опубликовано: 15 фев. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 5.3

Описание

Brocade SANnav before SANnav 2.3.1b enables weak TLS ciphers on ports 443 and 18082. In case of a successful exploit, an attacker can read Brocade SANnav data stream that includes monitored Brocade Fabric OS switches performance data, port status, zoning information, WWNs, IP Addresses, but no customer data, no personal data and no secrets or passwords, as it travels across the network.

Brocade SANnav before SANnav 2.3.1b enables weak TLS ciphers on ports 443 and 18082. In case of a successful exploit, an attacker can read Brocade SANnav data stream that includes monitored Brocade Fabric OS switches performance data, port status, zoning information, WWNs, IP Addresses, but no customer data, no personal data and no secrets or passwords, as it travels across the network.

EPSS

Процентиль: 20%
0.00066
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-327

Связанные уязвимости

CVSS3: 5.3
nvd
12 месяцев назад

Brocade SANnav before SANnav 2.3.1b enables weak TLS ciphers on ports 443 and 18082. In case of a successful exploit, an attacker can read Brocade SANnav data stream that includes monitored Brocade Fabric OS switches performance data, port status, zoning information, WWNs, IP Addresses, but no customer data, no personal data and no secrets or passwords, as it travels across the network.

CVSS3: 7.3
fstec
12 месяцев назад

Уязвимость реализации протокола TLS программного обеспечение для управления сетью SAN Brocade SANnav, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 20%
0.00066
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-327