Vulnerability Description
An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Brocade | Sannav | < 2.2.0 |
Related Weaknesses (CWE)
References
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brVendor Advisory
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brVendor Advisory
FAQ
What is CVE-2022-28161?
CVE-2022-28161 is a vulnerability with a CVSS score of 5.5 (MEDIUM). An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh pas...
How severe is CVE-2022-28161?
CVE-2022-28161 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-28161?
Check the references section above for vendor advisories and patch information. Affected products include: Brocade Sannav.