By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.
References
Configurations
No configuration.
History
21 Nov 2024, 09:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.netapp.com/advisory/ntap-20240628-0003/ - | |
References | () https://support.broadcom.com/external/content/SecurityAdvisories/0/23245 - |
01 Aug 2024, 13:49
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-269 |
28 Jun 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
27 Apr 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-27 00:15
Updated : 2024-11-21 09:10
NVD link : CVE-2024-2859
Mitre link : CVE-2024-2859
CVE.ORG link : CVE-2024-2859
JSON object : View
Products Affected
No product.
CWE
CWE-269
Improper Privilege Management