{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T07:16:48.983","vulnerabilities":[{"cve":{"id":"CVE-2024-29960","sourceIdentifier":"sirt@brocade.com","published":"2024-04-19T04:15:10.270","lastModified":"2025-02-04T15:53:21.440","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"\nIn Brocade SANnav server before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are identical in the VM every time SANnav is installed. Any Brocade SAnnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav.\n\n"},{"lang":"es","value":"En las versiones del servidor Brocade SANnav anteriores a v2.3.1 y v2.3.0a, las claves SSH dentro de la imagen OVA están codificadas y son idénticas en la VM cada vez que se instala SANnav. Cualquier máquina virtual Brocade SANnav basada en las imágenes OVA oficiales es vulnerable a MITM a través de SSH. Un atacante puede descifrar y comprometer el tráfico SSH al dispositivo SANnav."}],"metrics":{"cvssMetricV31":[{"source":"sirt@brocade.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9}]},"weaknesses":[{"source":"sirt@brocade.com","type":"Secondary","description":[{"lang":"en","value":"CWE-798"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-798"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*","versionEndExcluding":"2.3.0a","matchCriteriaId":"303EE152-4CED-4655-B035-CB3B91E5E288"}]}]}],"references":[{"url":"https://support.broadcom.com/external/content/SecurityAdvisories/0/23244","source":"sirt@brocade.com","tags":["Vendor Advisory"]},{"url":"https://support.broadcom.com/external/content/SecurityAdvisories/0/23244","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}