Brocade SANnav versions before v2.0 use a hard-coded password, which could allow local authenticated attackers to access a back-end database and gain privileges.
References
Link | Resource |
---|---|
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-866 | Vendor Advisory |
Configurations
Information
Published : 2019-11-08 10:15
Updated : 2019-11-09 14:28
NVD link : CVE-2019-16207
Mitre link : CVE-2019-16207
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
broadcom
- brocade_sannav