Home

Description

A vulnerability in Brocade SANnav before 2.4.0b prints the Password-Based Encryption (PBE) key in plaintext in the system audit log file. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the pbe key. Note: The vulnerability is only triggered during a migration and not in a new installation. The system audit logs are accessible only to a privileged user on the server. These audit logs are the local server VM’s audit logs and are not controlled by SANnav. These logs are only visible to the server admin of the host server and are not visible to the SANnav admin or any SANnav user.

PUBLISHED Reserved 2025-11-03 | Published 2026-02-02 | Updated 2026-02-04 | Assigner brocade




HIGH: 7.1CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H

Problem types

CWE-312 Cleartext Storage of Sensitive Information

Product status

Default status
unaffected

SANnav before 2.4.0b
affected

References

support.broadcom.com/...l/content/SecurityAdvisories/0/36845

cve.org (CVE-2025-12679)

nvd.nist.gov (CVE-2025-12679)

Download JSON