7.2
CVSSv3

CVE-2020-15382

Published: 09/06/2021 Updated: 17/06/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Brocade SANnav before version 2.1.1 uses a hard-coded administrator account with the weak password ‘passw0rd’ if a password is not provided for PostgreSQL at install-time.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

broadcom brocade sannav

Github Repositories

CVE-2020-15382 Exploit Brocade SANnav before version 211 uses a hard-coded administrator account with the weak password ‘passw0rd’ if a password is not provided for PostgreSQL at install-time Windows Binary PoC /CVE-2020-15382exe will run the exploit /CVE-2020-15382exe -t Target IP /CVE-2020-15382exe -t wwwexamplecom