CVE-2024-29960

In Brocade SANnav server before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are identical in the VM every time SANnav is installed. Any Brocade SAnnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav.
Configurations

No configuration.

History

26 Apr 2024, 22:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 6.8
Summary (en) In the Brocade SANnav server versions before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are hardcoded and identical in the VM every time SANnav is installed. Any Brocade SANnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav appliance. (en) In Brocade SANnav server before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are identical in the VM every time SANnav is installed. Any Brocade SAnnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav.

19 Apr 2024, 13:10

Type Values Removed Values Added
Summary
  • (es) En las versiones del servidor Brocade SANnav anteriores a v2.3.1 y v2.3.0a, las claves SSH dentro de la imagen OVA están codificadas y son idénticas en la VM cada vez que se instala SANnav. Cualquier máquina virtual Brocade SANnav basada en las imágenes OVA oficiales es vulnerable a MITM a través de SSH. Un atacante puede descifrar y comprometer el tráfico SSH al dispositivo SANnav.

19 Apr 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-19 04:15

Updated : 2024-04-26 22:15


NVD link : CVE-2024-29960

Mitre link : CVE-2024-29960

CVE.ORG link : CVE-2024-29960


JSON object : View

Products Affected

No product.

CWE
CWE-798

Use of Hard-coded Credentials