• Published Date: Fri 08 Nov 2019
  • Last Modified Date: Thu 14 Nov 2019

A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.


Severity: MEDIUM
Exploitability Score: 8.6
Impact Score: 2.9
Attack Vector (AV): NETWORK
Attack Complexity (AC): MEDIUM
Privileges Required (PR): NONE
Availability (A): NONE

References (Advisories, Solutions, and Tools):

Note: This page is generated by our securitybot and has not been checked for errors. Feed Source: NVD