Brocade SANnav before SANnav 2.3.1b
enables weak TLS ciphers on ports 443 and 18082. In case of a successful
exploit, an attacker can read Brocade SANnav data stream that includes
monitored Brocade Fabric OS switches performance data, port status,
zoning information, WWNs, IP Addresses, but no customer data, no
personal data and no secrets or passwords, as it travels across the
network.
References
Link | Resource |
---|---|
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25402 | Vendor Advisory |
Configurations
History
26 Aug 2025, 19:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25402 - Vendor Advisory | |
Summary |
|
|
First Time |
Broadcom brocade Sannav
Broadcom |
|
CPE | cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
15 Feb 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-15 00:15
Updated : 2025-08-26 19:44
NVD link : CVE-2024-10405
Mitre link : CVE-2024-10405
CVE.ORG link : CVE-2024-10405
JSON object : View
Products Affected
broadcom
- brocade_sannav
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm