{"uuid": "eb7cc406-8af0-4328-8d21-96ae13df37cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://t.me/cvedetector/18149", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10405 - Brocade SANnav Weak TLS Cipher Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10405 \nPublished : Feb. 15, 2025, 12:15 a.m. | 21\u00a0minutes ago \nDescription : Brocade SANnav before SANnav 2.3.1b   \nenables weak TLS ciphers on ports 443 and 18082. In case of a successful  \n exploit, an attacker can read Brocade SANnav data stream that includes   \nmonitored Brocade Fabric OS switches performance data, port status,   \nzoning information, WWNs, IP Addresses, but no customer data, no   \npersonal data and no secrets or passwords, as it travels across the   \nnetwork. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-15T01:49:12.000000Z"}