- Description
- Docker daemon in Brocade SANnav before SANnav 2.3.1b runs without auditing. The vulnerability could allow a remote authenticated attacker to execute various attacks.
- Source
- sirt@brocade.com
- NVD status
- Received
CVSS 4.0
- Type
- Secondary
- Base score
- 8.6
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- HIGH
- sirt@brocade.com
- CWE-250
- Hype score
- Not currently trending
๐จ CVE-2024-2240 ๐ด HIGH (8.6) ๐ข Brocade - Brocade SANnav ๐๏ธ Brocade SANnav before 2.3.1b ๐ https://t.co/PtUsQ0n7Ny #CyberCron #VulnAlert https://t.co/roqdy5sHHq
@cybercronai
16 Feb 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-2240 Docker daemon in Brocade SANnav before SANnav 2.3.1b runs without auditing. The vulnerability could allow a remote authenticated attacker to execute various attacks. https://t.co/tsBnr4XVOZ
@CVEnew
14 Feb 2025
470 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-2240: HIGH] Docker daemon in Brocade SANnav before SANnav 2.3.1b runs without auditing. The vulnerability could allow a remote authenticated attacker to execute various attacks.#cybersecurity,#vulnerability https://t.co/0ZkqNNKkYV https://t.co/s7vjX4iGIt
@CveFindCom
14 Feb 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes