A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a could allow the collection of SANnav database password in the system audit logs. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the Brocade SANnav database password.
References
| Link | Resource |
|---|---|
| https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36847 | Vendor Advisory |
Configurations
History
03 Mar 2026, 00:59
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| First Time |
Broadcom
Broadcom sannav |
|
| References | () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36847 - Vendor Advisory | |
| CPE | cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:* | |
| Summary |
|
03 Feb 2026, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-03 01:15
Updated : 2026-03-03 00:59
NVD link : CVE-2025-12773
Mitre link : CVE-2025-12773
CVE.ORG link : CVE-2025-12773
JSON object : View
Products Affected
broadcom
- sannav
CWE
CWE-209
Generation of Error Message Containing Sensitive Information
