CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

broadcom

brocade_sannav

54 known vulnerabilities · sorted by CVSS score

CVE-2024-4282
CRITICAL9.8

Brocade SANnav OVA before SANnav 2.3.1b enables SHA1 deprecated setting for SSH for port 22.

broadcom / brocade_sannav
Network
Published Feb 15, 2025
Page 1 of 3
CVE-2019-16211
CRITICAL9.8

Brocade SANnav versions before v2.1.0, contain a Plaintext Password Storage vulnerability.

broadcom / brocade_sannav
Network
Published Sep 25, 2020
CVE-2022-23305
CRITICAL9.8

By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

apache / log4j+41
Network
Published Jan 18, 2022
CVE-2024-3596
CRITICAL9.0

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

freeradius / freeradius+3
Network
Published Jul 9, 2024
CVE-2019-16212
HIGH8.8

A vulnerability in Brocade SANnav versions before v2.1.0 could allow a remote authenticated attacker to conduct an LDAP injection. The vulnerability could allow a remote attacker to bypass the authentication process.

broadcom / brocade_sannav
Network
Published Sep 25, 2020
CVE-2019-16205
HIGH8.8

A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.

broadcom / brocade_sannav
Network
Published Nov 8, 2019
CVE-2022-23302
HIGH8.8

JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

apache / log4j+39
Network
Published Jan 18, 2022
CVE-2024-29959
HIGH8.6

A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints Brocade Fabric OS switch encrypted passwords in the Brocade SANnav Standby node's support save.

broadcom / brocade_sannav
Network
Published Apr 19, 2024
CVE-2024-4161
HIGH8.6

In Brocade SANnav, before Brocade SANnav v2.3.0, syslog traffic received clear text. This could allow an unauthenticated, remote attacker to capture sensitive information.

broadcom / brocade_sannav
Network
Published Apr 25, 2024
CVE-2024-29961
HIGH8.2

A vulnerability affects Brocade SANnav before v2.3.1 and v2.3.0a. It allows a Brocade SANnav service to send ping commands in the background at regular intervals to gridgain.com to check if updates are available for the Component. This could make an unauthenticated, remote attacker aware of the behavior and launch a supply-chain attack against a Brocade SANnav appliance.

broadcom / brocade_sannav
Network
Published Apr 19, 2024
CVE-2023-31424
HIGH8.1

Brocade SANnav Web interface before Brocade SANnav v2.3.0 and v2.2.2a allows remote unauthenticated users to bypass web authentication and authorization.

broadcom / brocade_sannav
Network
Published Aug 31, 2023
CVE-2019-16207
HIGH7.8

Brocade SANnav versions before v2.0 use a hard-coded password, which could allow local authenticated attackers to access a back-end database and gain privileges.

broadcom / brocade_sannav
Local
Published Nov 8, 2019
CVE-2024-2860
HIGH7.8

The PostgreSQL implementation in Brocade SANnav versions before 2.3.0a is vulnerable to an incorrect local authentication flaw. An attacker accessing the VM where the Brocade SANnav is installed can gain access to sensitive data inside the PostgreSQL database.

broadcom / brocade_sannav+1
Local
Published May 8, 2024
CVE-2024-29968
HIGH7.7

An information disclosure vulnerability exists in Brocade SANnav before v2.3.1 and v2.3.0a when Brocade SANnav instances are configured in disaster recovery mode. SQL Table names, column names, and SQL queries are collected in DR standby Supportsave. This could allow authenticated users to access the database structure and its contents.

broadcom / brocade_sannav
Network
Published Apr 19, 2024
CVE-2024-4173
HIGH7.6

A vulnerability in Brocade SANnav exposes Kafka in the wan interface. The vulnerability could allow an unauthenticated attacker to perform various attacks, including DOS against the Brocade SANnav.

broadcom / brocade_sannav
Adjacent
Published Apr 25, 2024
CVE-2020-15379
HIGH7.5

Brocade SANnav before v.2.1.0a could allow remote attackers cause a denial-of-service condition due to a lack of proper validation, of the length of user-supplied data as name for custom field name.

broadcom / brocade_sannav
Network
Published Jun 9, 2021
CVE-2024-29958
HIGH7.5

A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints the encryption key in the console when a privileged user executes the script to replace the Brocade SANnav Management Portal standby node. This could provide attackers an additional, less protected path to acquiring the encryption key.

broadcom / brocade_sannav
Network
Published Apr 19, 2024
CVE-2024-29969
HIGH7.5

When a Brocade SANnav installation is upgraded from Brocade SANnav v2.2.2 to Brocade SANnav 2.3.0, TLS/SSL weak message authentication code ciphers are added by default for port 18082.

broadcom / brocade_sannav
Network
Published Apr 19, 2024
CVE-2024-29966
HIGH7.5

Brocade SANnav OVA before v2.3.1 and v2.3.0a contain hard-coded credentials in the documentation that appear as the appliance's root password. The vulnerability could allow an unauthenticated attacker full access to the Brocade SANnav appliance.

broadcom / brocade_sannav
Network
Published Apr 19, 2024
CVE-2019-16208
HIGH7.5

Password-based encryption (PBE) algorithm, of Brocade SANnav versions before v2.0, has a weakness in generating cryptographic keys that may allow an attacker to decrypt passwords used with several services (Radius, TACAS, etc.).

broadcom / brocade_sannav
Network
Published Nov 8, 2019