Vulnerability Description
By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Broadcom | Brocade Sannav | < 2.3.0 |
Related Weaknesses (CWE)
References
- https://security.netapp.com/advisory/ntap-20240628-0003/Third Party Advisory
- https://support.broadcom.com/external/content/SecurityAdvisories/0/23245Vendor Advisory
- https://security.netapp.com/advisory/ntap-20240628-0003/Third Party Advisory
- https://support.broadcom.com/external/content/SecurityAdvisories/0/23245Vendor Advisory
FAQ
What is CVE-2024-2859?
CVE-2024-2859 is a vulnerability with a CVSS score of 6.8 (MEDIUM). By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.
How severe is CVE-2024-2859?
CVE-2024-2859 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2859?
Check the references section above for vendor advisories and patch information. Affected products include: Broadcom Brocade Sannav.