By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.
References
| Link | Resource |
|---|---|
| https://security.netapp.com/advisory/ntap-20240628-0003/ | Third Party Advisory |
| https://support.broadcom.com/external/content/SecurityAdvisories/0/23245 | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20240628-0003/ | Third Party Advisory |
| https://support.broadcom.com/external/content/SecurityAdvisories/0/23245 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-04-27 00:15
Updated : 2025-09-02 18:31
NVD link : CVE-2024-2859
Mitre link : CVE-2024-2859
CVE.ORG link : CVE-2024-2859
JSON object : View
Products Affected
broadcom
- brocade_sannav
CWE
CWE-276
Incorrect Default Permissions
