CVE-2020-15387

The host SSH servers of Brocade Fabric OS before Brocade Fabric OS v7.4.2h, v8.2.1c, v8.2.2, v9.0.0, and Brocade SANnav before v2.1.1 utilize keys of less than 2048 bits, which may be vulnerable to man-in-the-middle attacks and/or insecure SSH communications.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2a:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2b:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2c:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2d:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2f:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2g:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1a:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1b:*:*:*:*:*:*:*

History

23 Aug 2021, 14:47

Type Values Removed Values Added
CPE cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:a:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:b:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:f:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:-:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:-:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:g:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:d:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:b:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:c:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:a:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2d:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2f:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1a:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2a:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2b:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1b:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2c:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2g:*:*:*:*:*:*:*

24 Jun 2021, 19:48

Type Values Removed Values Added
References (MISC) https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1291 - (MISC) https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1291 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.8
v3 : 7.4
CWE CWE-326
CPE cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:g:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:f:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:a:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:d:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:a:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:b:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:b:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:-:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:c:*:*:*:*:*:*
cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:-:*:*:*:*:*:*

09 Jun 2021, 16:29

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-09 16:15

Updated : 2024-02-04 21:47


NVD link : CVE-2020-15387

Mitre link : CVE-2020-15387

CVE.ORG link : CVE-2020-15387


JSON object : View

Products Affected

broadcom

  • brocade_sannav
  • fabric_operating_system
CWE
CWE-326

Inadequate Encryption Strength