diff --git a/doc/cna_readme_notes/cnas_with_html_advisories.md b/doc/cna_readme_notes/cnas_with_html_advisories.md index 4786f0f..b6abe19 100644 --- a/doc/cna_readme_notes/cnas_with_html_advisories.md +++ b/doc/cna_readme_notes/cnas_with_html_advisories.md @@ -370,10 +370,37 @@ https://www.blackberry.com/us/en/services/blackberry-product-security-incident-r } } ``` + ## Brocade Communication Systems, LLC ### Advisory https://www.broadcom.com/support/fibre-channel-networking/security-advisories #### Captured Data Potential From Advisory +``` +{ + :bulletin_id => 'BSA-2022-1844', + :initial_publication_date => '05/04/22', + :last_updated => '05/04/22', + :revision => '1.0', + :risk_impact => 'High', + :workaround => 'N/A', + :component => 'RBAC', + :affected_cve => 'CVE-2022-28165', + :cvss_score => '8.0 - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H', + :description => 'A vulnerability in the role-based access control (RBAC) functionality of the Brocade SANNav before 2.2.0 could allow an authenticated, remote attacker to access resources that they should not be able to access and perform actions that they should not be able to perform. The vulnerability exists because restrictions are not performed on Server side to ensure the user has required permission before processing requests.', + :affected_products => [ + 'Brocade SANnav - Fixed in Brocade SANnav 2.2.0' + ], + :product_confirmed_not_vulnerable => 'No other Brocade Fibre Channel Products from Broadcom products are currently known to be affected by this vulnerability.', + :credit => 'The issue was discovered in penetration testing.', + :revision_history => [ + { + :version => '1.0', + :change => 'Initial Publication', + :date => 'May 3, 2022' + } + ] +} +``` ## CA Technologies - A Broadcom Company ### Advisory