Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support save logs.
When OOM occurs on a Brocade SANnav server, the call stack trace for the Brocade switch is also collected in the heap dump file which contains this switch password in clear text. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the switch admin password.
References
| Link | Resource |
|---|---|
| https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36846 | Vendor Advisory |
Configurations
History
09 Feb 2026, 16:12
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:* | |
| First Time |
Broadcom
Broadcom sannav |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.9 |
| References | () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36846 - Vendor Advisory |
02 Feb 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-02 23:15
Updated : 2026-02-09 16:12
NVD link : CVE-2025-12772
Mitre link : CVE-2025-12772
CVE.ORG link : CVE-2025-12772
JSON object : View
Products Affected
broadcom
- sannav
CWE
CWE-312
Cleartext Storage of Sensitive Information
