{"containers":{"cna":{"affected":[{"product":"Brocade SANnav","vendor":"n/a","versions":[{"status":"affected","version":"versions before v2.2.0.2 and v2.1.1.8"}]}],"descriptions":[{"lang":"en","value":"In Brocade SANnav before Brocade SANnav v2.2.0.2 and Brocade SANnav2.1.1.8, encoded scp-server passwords are stored using Base64 encoding, which could allow an attacker able to access log files to easily decode the passwords."}],"problemTypes":[{"descriptions":[{"description":"Inadequate Encryption Strength.","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-06-27T19:06:20.000Z","orgId":"87b297d7-335e-4844-9551-11b97995a791","shortName":"brocade"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1979"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20220627-0003/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"sirt@brocade.com","ID":"CVE-2022-28168","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Brocade SANnav","version":{"version_data":[{"version_value":"versions before v2.2.0.2 and v2.1.1.8"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Brocade SANnav before Brocade SANnav v2.2.0.2 and Brocade SANnav2.1.1.8, encoded scp-server passwords are stored using Base64 encoding, which could allow an attacker able to access log files to easily decode the passwords."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Inadequate Encryption Strength."}]}]},"references":{"reference_data":[{"name":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1979","refsource":"MISC","url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1979"},{"name":"https://security.netapp.com/advisory/ntap-20220627-0003/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20220627-0003/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T05:48:37.470Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1979"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20220627-0003/"}]}]},"cveMetadata":{"assignerOrgId":"87b297d7-335e-4844-9551-11b97995a791","assignerShortName":"brocade","cveId":"CVE-2022-28168","datePublished":"2022-06-27T17:52:02.000Z","dateReserved":"2022-03-29T00:00:00.000Z","dateUpdated":"2024-08-03T05:48:37.470Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}