Description
Brocade SANnav before v2.3.1 and v2.3.0a uses the SHA-1 hash in internal SSH ports that are not open to remote connection.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-26925 | Brocade SANnav before v2.3.1 and v2.3.0a uses the SHA-1 hash in internal SSH ports that are not open to remote connection. |
References
History
Tue, 04 Feb 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom brocade Sannav |
|
| CPEs | cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Broadcom
Broadcom brocade Sannav |
Status: PUBLISHED
Assigner: brocade
Published:
Updated: 2024-08-02T01:17:58.619Z
Reserved: 2024-03-22T05:00:09.537Z
Link: CVE-2024-29951
Updated: 2024-08-02T01:17:58.619Z
Status : Analyzed
Published: 2024-04-17T20:15:08.060
Modified: 2025-02-04T16:01:19.393
Link: CVE-2024-29951
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD