CVE-2025-12773

A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a could allow the collection of SANnav database password in the system audit logs. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the Brocade SANnav database password.
Configurations

Configuration 1 (hide)

cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:*

History

03 Mar 2026, 00:59

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Broadcom
Broadcom sannav
References () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36847 - () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36847 - Vendor Advisory
CPE cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:*
Summary
  • (es) Una vulnerabilidad en el registro del script update-reports-purge-settings.sh para Brocade SANnav anterior a 2.4.0a podría permitir la recopilación de la contraseña de la base de datos de SANnav en los registros de auditoría del sistema. La vulnerabilidad podría permitir a un atacante remoto autenticado con acceso a los registros de auditoría acceder a la contraseña de la base de datos de Brocade SANnav.

03 Feb 2026, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 01:15

Updated : 2026-03-03 00:59


NVD link : CVE-2025-12773

Mitre link : CVE-2025-12773

CVE.ORG link : CVE-2025-12773


JSON object : View

Products Affected

broadcom

  • sannav
CWE
CWE-209

Generation of Error Message Containing Sensitive Information