Broadcom SANnav 2.1.0

CPE Details

Broadcom SANnav 2.1.0
2.1.0
2021-07-13
11h19 +00:00
2021-07-15
14h04 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:broadcom:sannav:2.1.0:*:*:*:*:*:*:*

Informations

Vendor

broadcom

Product

sannav

Version

2.1.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-28168 2022-06-27 15h52 +00:00 In Brocade SANnav before Brocade SANnav v2.2.0.2 and Brocade SANnav2.1.1.8, encoded scp-server passwords are stored using Base64 encoding, which could allow an attacker able to access log files to easily decode the passwords.
7.5
Haute
CVE-2022-28167 2022-06-27 15h51 +00:00 Brocade SANnav before Brocade SANvav v. 2.2.0.2 and Brocade SANanv v.2.1.1.8 logs the Brocade Fabric OS switch password in plain text in asyncjobscheduler-manager.log
6.5
Moyen
CVE-2022-28166 2022-06-27 15h51 +00:00 In Brocade SANnav version before SANN2.2.0.2 and Brocade SANNav before 2.1.1.8, the implementation of TLS/SSL Server Supports the Use of Static Key Ciphers (ssl-static-key-ciphers) on ports 443 & 18082.
7.5
Haute
CVE-2022-28162 2022-05-09 14h31 +00:00 Brocade SANnav before version SANnav 2.2.0 logs the REST API Authentication token in plain text.
3.3
Bas
CVE-2022-28165 2022-05-06 14h08 +00:00 A vulnerability in the role-based access control (RBAC) functionality of the Brocade SANNav before 2.2.0 could allow an authenticated, remote attacker to access resources that they should not be able to access and perform actions that they should not be able to perform. The vulnerability exists because restrictions are not performed on Server side to ensure the user has required permission before processing requests.
8.8
Haute
CVE-2022-28163 2022-05-06 14h01 +00:00 In Brocade SANnav before Brocade SANnav 2.2.0, multiple endpoints associated with Zone management are susceptible to SQL injection, allowing an attacker to run arbitrary SQL commands.
9.8
Critique
CVE-2022-28164 2022-05-06 14h01 +00:00 Brocade SANnav before SANnav 2.2.0 application uses the Blowfish symmetric encryption algorithm for the storage of passwords. This could allow an authenticated attacker to decrypt stored account passwords.
6.5
Moyen
CVE-2020-15385 2021-06-09 13h42 +00:00 Brocade SANnav before version 2.1.1 allows an authenticated attacker to list directories, and list files without permission. As a result, users without permission can see folders, and hidden files, and can create directories without permission.
5.4
Moyen
CVE-2020-15384 2021-06-09 13h42 +00:00 Brocade SANNav before version 2.1.1 contains an information disclosure vulnerability. Successful exploitation of internal server information in the initial login response header.
5.3
Moyen
CVE-2020-15380 2021-06-09 13h15 +00:00 Brocade SANnav before version 2.1.1 logs account credentials at the ‘trace’ logging level.
7.5
Haute
CVE-2020-15378 2021-06-09 13h15 +00:00 The OVA version of Brocade SANnav before version 2.1.1 installation with IPv6 networking exposes the docker container ports to the network, increasing the potential attack surface.
5.3
Moyen
CVE-2020-15377 2021-06-09 13h15 +00:00 Webtools in Brocade SANnav before version 2.1.1 allows unauthenticated users to make requests to arbitrary hosts due to a misconfiguration; this is commonly referred to as Server-Side Request Forgery (SSRF).
9.8
Critique
CVE-2020-15381 2021-06-09 12h32 +00:00 Brocade SANnav before version 2.1.1 contains an Improper Authentication vulnerability that allows cleartext transmission of authentication credentials of the jmx server.
7.5
Haute