{"uuid": "80fbb8a1-b1f8-43a1-9636-be0a7872ce2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4521", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10405\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Brocade SANnav before SANnav 2.3.1b \nenables weak TLS ciphers on ports 443 and 18082. In case of a successful\n exploit, an attacker can read Brocade SANnav data stream that includes \nmonitored Brocade Fabric OS switches performance data, port status, \nzoning information, WWNs, IP Addresses, but no customer data, no \npersonal data and no secrets or passwords, as it travels across the \nnetwork.\n\ud83d\udccf Published: 2025-02-15T00:32:47Z\n\ud83d\udccf Modified: 2025-02-15T00:32:47Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-10405\n2. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25402", "creation_timestamp": "2025-02-15T01:11:38.000000Z"}