A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.
References
Link | Resource |
---|---|
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-864 | Vendor Advisory |
Configurations
Information
Published : 2019-11-08 10:15
Updated : 2019-11-14 06:43
NVD link : CVE-2019-16205
Mitre link : CVE-2019-16205
JSON object : View
CWE
CWE-330
Use of Insufficiently Random Values
Products Affected
broadcom
- brocade_sannav