{"vulnerability": "CVE-2024-10405", "sightings": [{"uuid": "b8156532-a0db-480c-8bc5-f6d47ea03669", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114004829759031436", "content": "", "creation_timestamp": "2025-02-14T23:27:29.878286Z"}, {"uuid": "42e3ce23-fab2-499d-950d-9a14806a55be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li6gsve2gt2y", "content": "", "creation_timestamp": "2025-02-15T00:15:53.886380Z"}, {"uuid": "c63bc4fa-afbd-48f7-b381-b639e9a19e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li6pyznkse2m", "content": "", "creation_timestamp": "2025-02-15T03:00:24.161035Z"}, {"uuid": "80fbb8a1-b1f8-43a1-9636-be0a7872ce2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4521", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10405\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Brocade SANnav before SANnav 2.3.1b \nenables weak TLS ciphers on ports 443 and 18082. In case of a successful\n exploit, an attacker can read Brocade SANnav data stream that includes \nmonitored Brocade Fabric OS switches performance data, port status, \nzoning information, WWNs, IP Addresses, but no customer data, no \npersonal data and no secrets or passwords, as it travels across the \nnetwork.\n\ud83d\udccf Published: 2025-02-15T00:32:47Z\n\ud83d\udccf Modified: 2025-02-15T00:32:47Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-10405\n2. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25402", "creation_timestamp": "2025-02-15T01:11:38.000000Z"}, {"uuid": "ed3817e8-2755-4c95-87ef-c4c51ba474c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4517", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10405\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-15T00:15:13.023\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25402", "creation_timestamp": "2025-02-15T01:10:33.000000Z"}, {"uuid": "eb7cc406-8af0-4328-8d21-96ae13df37cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://t.me/cvedetector/18149", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10405 - Brocade SANnav Weak TLS Cipher Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10405 \nPublished : Feb. 15, 2025, 12:15 a.m. | 21\u00a0minutes ago \nDescription : Brocade SANnav before SANnav 2.3.1b   \nenables weak TLS ciphers on ports 443 and 18082. In case of a successful  \n exploit, an attacker can read Brocade SANnav data stream that includes   \nmonitored Brocade Fabric OS switches performance data, port status,   \nzoning information, WWNs, IP Addresses, but no customer data, no   \npersonal data and no secrets or passwords, as it travels across the   \nnetwork. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-15T01:49:12.000000Z"}]}