A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a could allow the collection of SANnav database password in the system audit logs. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the Brocade SANnav database password.
History

Tue, 03 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
First Time appeared Broadcom
Broadcom sannav
CPEs cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:*
Vendors & Products Broadcom
Broadcom sannav
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Brocade
Brocade sannav
Vendors & Products Brocade
Brocade sannav

Tue, 03 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a could allow the collection of SANnav database password in the system audit logs. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the Brocade SANnav database password.
Title Plain password is generated in the audit logs while executing update-reports-purge-settings.sh script with Brocade SANnav before 2.4.0a
Weaknesses CWE-209
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: brocade

Published: 2026-02-03T00:38:08.909Z

Updated: 2026-02-03T20:46:49.012Z

Reserved: 2025-11-05T20:06:40.271Z

Link: CVE-2025-12773

cve-icon Vulnrichment

Updated: 2026-02-03T20:45:42.345Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T01:15:57.610

Modified: 2026-03-03T00:59:32.217

Link: CVE-2025-12773

cve-icon Redhat

No data.