A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.
References
Configurations
History
21 Nov 2024, 04:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-864 - Vendor Advisory |
Information
Published : 2019-11-08 18:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16205
Mitre link : CVE-2019-16205
CVE.ORG link : CVE-2019-16205
JSON object : View
Products Affected
broadcom
- brocade_sannav
CWE
CWE-330
Use of Insufficiently Random Values