Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support save logs.
When OOM occurs on a Brocade SANnav server, the call stack trace for the Brocade switch is also collected in the heap dump file which contains this switch password in clear text. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the switch admin password.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Feb 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Brocade
Brocade sannav |
|
| Vendors & Products |
Brocade
Brocade sannav |
Mon, 02 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support save logs. When OOM occurs on a Brocade SANnav server, the call stack trace for the Brocade switch is also collected in the heap dump file which contains this switch password in clear text. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the switch admin password. | |
| Title | Plaintext Switch admin login password is seen in Brocade SANnav support save | |
| Weaknesses | CWE-312 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: brocade
Published: 2026-02-02T22:41:13.921Z
Updated: 2026-02-03T01:59:41.935Z
Reserved: 2025-11-05T20:05:22.781Z
Link: CVE-2025-12772
No data.
Status : Awaiting Analysis
Published: 2026-02-02T23:15:58.453
Modified: 2026-02-03T16:44:03.343
Link: CVE-2025-12772
No data.