Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-29960 | First vendor Publication | 2024-04-19 |
Vendor | Cve | Last vendor Modification | 2024-04-26 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
In Brocade SANnav server before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are identical in the VM every time SANnav is installed. Any Brocade SAnnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29960 |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-04-27 05:27:29 |
|
2024-04-20 02:48:43 |
|
2024-04-20 02:48:41 |
|
2024-04-19 17:27:36 |
|
2024-04-19 09:27:24 |
|