Description
The class FileTransfer implemented in Brocade SANnav before v2.3.1, v2.3.0a, uses the ssh-rsa signature scheme, which has a SHA-1 hash.
The vulnerability could allow a remote, unauthenticated attacker to perform a man-in-the-middle attack.
The vulnerability could allow a remote, unauthenticated attacker to perform a man-in-the-middle attack.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-26924 | The class FileTransfer implemented in Brocade SANnav before v2.3.1, v2.3.0a, uses the ssh-rsa signature scheme, which has a SHA-1 hash. The vulnerability could allow a remote, unauthenticated attacker to perform a man-in-the-middle attack. |
References
History
Tue, 04 Feb 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom brocade Sannav |
|
| CPEs | cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Broadcom
Broadcom brocade Sannav |
Status: PUBLISHED
Assigner: brocade
Published:
Updated: 2024-08-02T01:17:58.630Z
Reserved: 2024-03-22T05:00:09.537Z
Link: CVE-2024-29950
Updated: 2024-08-02T01:17:58.630Z
Status : Analyzed
Published: 2024-04-17T19:15:07.213
Modified: 2025-02-04T15:40:21.197
Link: CVE-2024-29950
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD