Description
An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-32615 | An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode. |
References
History
No history.
Status: PUBLISHED
Assigner: brocade
Published:
Updated: 2024-08-03T05:48:37.343Z
Reserved: 2022-03-29T00:00:00.000Z
Link: CVE-2022-28161
No data.
Status : Modified
Published: 2022-05-09T17:15:09.177
Modified: 2024-11-21T06:56:52.357
Link: CVE-2022-28161
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD