Brocade SANnav before Brocade SANnav 2.4.0b logs database passwords in clear text in the standby SANnav server, after disaster recovery failover. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the database password.
References
| Link | Resource |
|---|---|
| https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36844 | Vendor Advisory |
Configurations
History
03 Mar 2026, 01:02
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Broadcom
Broadcom sannav |
|
| CPE | cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:* | |
| References | () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36844 - Vendor Advisory | |
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.9 |
02 Feb 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-02 23:15
Updated : 2026-03-03 01:02
NVD link : CVE-2025-12680
Mitre link : CVE-2025-12680
CVE.ORG link : CVE-2025-12680
JSON object : View
Products Affected
broadcom
- sannav
