CVE-2024-29950

The class FileTransfer implemented in Brocade SANnav before v2.3.1, v2.3.0a, uses the ssh-rsa signature scheme, which has a SHA-1 hash. The vulnerability could allow a remote, unauthenticated attacker to perform a man-in-the-middle attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*

History

04 Feb 2025, 15:40

Type Values Removed Values Added
CPE cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*
First Time Broadcom brocade Sannav
Broadcom
References () https://support.broadcom.com/external/content/SecurityAdvisories/0/23236 - () https://support.broadcom.com/external/content/SecurityAdvisories/0/23236 - Vendor Advisory

21 Nov 2024, 09:08

Type Values Removed Values Added
Summary
  • (es) La clase FileTransfer implementada en Brocade SANnav antes de v2.3.1, v2.3.0a, utiliza el esquema de firma ssh-rsa, que tiene un hash SHA-1. La vulnerabilidad podría permitir que un atacante remoto y no autenticado realice un ataque de intermediario.
References () https://support.broadcom.com/external/content/SecurityAdvisories/0/23236 - () https://support.broadcom.com/external/content/SecurityAdvisories/0/23236 -

17 Apr 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 19:15

Updated : 2025-02-04 15:40


NVD link : CVE-2024-29950

Mitre link : CVE-2024-29950

CVE.ORG link : CVE-2024-29950


JSON object : View

Products Affected

broadcom

  • brocade_sannav
CWE
CWE-326

Inadequate Encryption Strength