An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode.
References
Link | Resource |
---|---|
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1840 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: brocade
Published: 2022-05-09T16:33:41
Updated: 2022-05-09T16:33:41
Reserved: 2022-03-29T00:00:00
Link: CVE-2022-28161
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-09T17:15:09.177
Modified: 2022-05-17T18:56:12.677
Link: CVE-2022-28161
JSON object: View
Redhat Information
No data.
CWE