Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-27803 | By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account. |
Tue, 02 Sep 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:* |
Wed, 19 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-276 |
Fri, 21 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-269 |
Fri, 21 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom brocade Sannav |
|
| CPEs | cpe:2.3:a:broadcom:brocade_sannav:2.3.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Broadcom
Broadcom brocade Sannav |
|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account. | By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account. |
Status: PUBLISHED
Assigner: brocade
Published:
Updated: 2025-03-19T18:23:52.688Z
Reserved: 2024-03-24T00:55:53.564Z
Link: CVE-2024-2859
Updated: 2024-08-01T19:25:42.126Z
Status : Analyzed
Published: 2024-04-27T00:15:07.010
Modified: 2025-09-02T18:31:13.703
Link: CVE-2024-2859
No data.
OpenCVE Enrichment
No data.
EUVD