Vulnerability Description
In Brocade SANnav version before SANN2.2.0.2 and Brocade SANNav before 2.1.1.8, the implementation of TLS/SSL Server Supports the Use of Static Key Ciphers (ssl-static-key-ciphers) on ports 443 & 18082.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Broadcom | Sannav | < 2.1.1.8 |
Related Weaknesses (CWE)
References
- https://security.netapp.com/advisory/ntap-20220627-0001/Third Party Advisory
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brVendor Advisory
- https://security.netapp.com/advisory/ntap-20220627-0001/Third Party Advisory
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brVendor Advisory
FAQ
What is CVE-2022-28166?
CVE-2022-28166 is a vulnerability with a CVSS score of 7.5 (HIGH). In Brocade SANnav version before SANN2.2.0.2 and Brocade SANNav before 2.1.1.8, the implementation of TLS/SSL Server Supports the Use of Static Key Ciphers (ssl-static-key-ciphers) on ports 443 & 1808...
How severe is CVE-2022-28166?
CVE-2022-28166 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-28166?
Check the references section above for vendor advisories and patch information. Affected products include: Broadcom Sannav.