CVE-2024-4161

In Brocade SANnav, before Brocade SANnav v2.3.0, syslog traffic received clear text. This could allow an unauthenticated, remote attacker to capture sensitive information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*

History

06 Feb 2025, 17:50

Type Values Removed Values Added
References () https://support.broadcom.com/external/content/SecurityAdvisories/0/23284 - () https://support.broadcom.com/external/content/SecurityAdvisories/0/23284 - Vendor Advisory
CPE cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*
First Time Broadcom brocade Sannav
Broadcom

21 Nov 2024, 09:42

Type Values Removed Values Added
References () https://support.broadcom.com/external/content/SecurityAdvisories/0/23284 - () https://support.broadcom.com/external/content/SecurityAdvisories/0/23284 -

25 Apr 2024, 13:18

Type Values Removed Values Added
Summary
  • (es) En Brocade SANnav, antes de Brocade SANnav v2.3.0, el tráfico de syslog recibía texto plano. Esto podría permitir que un atacante remoto no autenticado capture información confidencial.

25 Apr 2024, 06:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-25 06:16

Updated : 2025-02-06 17:50


NVD link : CVE-2024-4161

Mitre link : CVE-2024-4161

CVE.ORG link : CVE-2024-4161


JSON object : View

Products Affected

broadcom

  • brocade_sannav
CWE
CWE-319

Cleartext Transmission of Sensitive Information