A vulnerability in Brocade SANnav before 2.4.0b prints the
Password-Based Encryption (PBE) key in plaintext in the system audit log
file. The vulnerability could allow a remote authenticated attacker
with access to the audit logs to access the pbe key.
Note: The vulnerability is only triggered during a migration and not
in a new installation. The system audit logs are accessible only to a
privileged user on the server.
These audit logs are the local server VM’s audit logs and are not
controlled by SANnav. These logs are only visible to the server admin of
the host server and are not visible to the SANnav admin or any SANnav
user.
References
| Link | Resource |
|---|---|
| https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36845 | Vendor Advisory |
Configurations
History
03 Mar 2026, 01:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36845 - Vendor Advisory | |
| Summary |
|
|
| First Time |
Broadcom
Broadcom sannav |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CPE | cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:* |
02 Feb 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-02 23:15
Updated : 2026-03-03 01:05
NVD link : CVE-2025-12679
Mitre link : CVE-2025-12679
CVE.ORG link : CVE-2025-12679
JSON object : View
Products Affected
broadcom
- sannav
CWE
CWE-312
Cleartext Storage of Sensitive Information
