CVE-2025-12772

Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support save logs. When OOM occurs on a Brocade SANnav server, the call stack trace for the Brocade switch is also collected in the heap dump file which contains this switch password in clear text. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the switch admin password.
Configurations

Configuration 1 (hide)

cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:*

History

09 Feb 2026, 16:12

Type Values Removed Values Added
CPE cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:*
First Time Broadcom
Broadcom sannav
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9
References () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36846 - () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36846 - Vendor Advisory

02 Feb 2026, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-02 23:15

Updated : 2026-02-09 16:12


NVD link : CVE-2025-12772

Mitre link : CVE-2025-12772

CVE.ORG link : CVE-2025-12772


JSON object : View

Products Affected

broadcom

  • sannav
CWE
CWE-312

Cleartext Storage of Sensitive Information