Page 3 of 15 results (0.024 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The authentication mechanism, in Brocade SANnav versions before v2.0, logs plaintext account credentials at the ‘trace’ and the 'debug' logging level; which could allow a local authenticated attacker to access sensitive information. El mecanismo de autenticación, en las versiones de Brocade SANnav anteriores a la versión v2.0, registra las credenciales de la cuenta de texto sin formato en el nivel de registro de "rastreo" y "depuración"; lo que podría permitir que un atacante autenticado local acceda a información confidencial. • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-865 • CWE-311: Missing Encryption of Sensitive Data CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal. Una vulnerabilidad, en Brocade SANnav versiones anteriores a v2.0, podría permitir a atacantes remotos forzar mediante fuerza bruta un ID de sesión válido. La vulnerabilidad es debido a un ID de sesión insuficientemente aleatorio para varias acciones posteriores a la autenticación en el portal SANnav. • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-864 • CWE-330: Use of Insufficiently Random Values •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Brocade SANnav versions before v2.0, logs plain text database connection password while triggering support save. Brocade SANnav versiones anteriores a v2.0, registra una contraseña de conexión de base de datos de texto plano mientras activa el guardado de soporte. • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-869 • CWE-311: Missing Encryption of Sensitive Data CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Password-based encryption (PBE) algorithm, of Brocade SANnav versions before v2.0, has a weakness in generating cryptographic keys that may allow an attacker to decrypt passwords used with several services (Radius, TACAS, etc.). El algoritmo password-based encryption (PBE), de Brocade SANnav versiones anteriores a v2.0, presenta una debilidad en la generación de claves criptográficas que puede permitir a un atacante descifrar las contraseñas utilizadas con varios servicios (Radius, TACAS, etc.). • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-867 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Brocade SANnav versions before v2.0 use a hard-coded password, which could allow local authenticated attackers to access a back-end database and gain privileges. Brocade SANnav versiones anteriores a v2.0, utilizan una contraseña embebida, lo que podría permitir a atacantes autenticados locales acceder a una base de datos del back-end y alcanzar privilegios. • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-866 • CWE-798: Use of Hard-coded Credentials •