A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.
References
Link | Resource |
---|---|
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-864 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2019-11-08 18:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-16205
Mitre link : CVE-2019-16205
CVE.ORG link : CVE-2019-16205
JSON object : View
Products Affected
broadcom
- brocade_sannav
CWE
CWE-330
Use of Insufficiently Random Values