Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12679: CWE-312 Cleartext Storage of Sensitive Information in Brocade SANnav

0
High
VulnerabilityCVE-2025-12679cvecve-2025-12679cwe-312
Published: Mon Feb 02 2026 (02/02/2026, 21:41:16 UTC)
Source: CVE Database V5
Vendor/Project: Brocade
Product: SANnav

Description

A vulnerability in Brocade SANnav before 2.4.0b prints the Password-Based Encryption (PBE) key in plaintext in the system audit log file. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the pbe key. Note: The vulnerability is only triggered during a migration and not in a new installation. The system audit logs are accessible only to a privileged user on the server. These audit logs are the local server VM’s audit logs and are not controlled by SANnav. These logs are only visible to the server admin of the host server and are not visible to the SANnav admin or any SANnav user.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:45:02 UTC

Technical Analysis

CVE-2025-12679 is a vulnerability classified under CWE-312 (Cleartext Storage of Sensitive Information) affecting Brocade SANnav versions before 2.4.0b. The flaw arises because the Password-Based Encryption (PBE) key, which is critical for securing sensitive data, is inadvertently printed in plaintext within the system audit log files during migration operations. These audit logs reside on the local server virtual machine hosting SANnav and are not controlled or visible to SANnav administrators or users, but only accessible to the server's privileged administrators. An attacker with remote authenticated access and high privileges on the server could access these audit logs and extract the PBE key. This exposure could compromise the confidentiality and integrity of encrypted data managed by SANnav. The vulnerability is triggered only during migration activities, not during fresh installations, limiting the attack surface somewhat. The CVSS 4.0 base score is 7.1 (high severity), reflecting the requirement for local privileges and the sensitive nature of the key exposure. No user interaction is required, but the attacker must have privileged remote access to the server hosting SANnav. There are no known exploits in the wild, but the potential impact on storage network security is significant given the role of SANnav in managing Brocade SAN environments.

Potential Impact

For European organizations using Brocade SANnav to manage their storage area networks, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data. Exposure of the PBE key could allow attackers to decrypt or manipulate encrypted data within the SAN environment, potentially leading to data breaches or disruption of critical storage services. Since SANnav is often deployed in enterprise data centers, including those supporting financial, healthcare, and governmental sectors in Europe, the impact could extend to highly sensitive or regulated data. The requirement for privileged access to the server audit logs limits the threat to insiders or attackers who have already compromised server credentials, but the risk remains substantial given the criticality of the encryption keys involved. Additionally, the vulnerability could facilitate lateral movement within networks if attackers leverage the exposed keys to access other encrypted resources. The limited scope to migration scenarios reduces the exposure window but does not eliminate the risk during upgrade or migration activities. Overall, the vulnerability could undermine trust in storage security and compliance with European data protection regulations such as GDPR if exploited.

Mitigation Recommendations

European organizations should immediately upgrade Brocade SANnav to version 2.4.0b or later where this vulnerability is fixed. Until patching is possible, strict access controls must be enforced on the server hosting SANnav to restrict audit log access exclusively to trusted administrators. Monitoring and auditing of privileged user activities on these servers should be enhanced to detect any unauthorized access attempts. Migration activities should be planned carefully, ensuring that only authorized personnel perform them in secure environments. Encrypting or securing audit logs at the system level can provide an additional layer of protection. Organizations should also review and rotate any encryption keys that may have been exposed if migration occurred before patching. Implementing network segmentation and multi-factor authentication for server access can reduce the risk of unauthorized privileged access. Finally, maintaining up-to-date backups and incident response plans will help mitigate potential damage if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
brocade
Date Reserved
2025-11-03T23:43:20.197Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813002f9fa50a62f63a035

Added to database: 2/2/2026, 11:15:14 PM

Last enriched: 2/10/2026, 10:45:02 AM

Last updated: 3/25/2026, 3:30:39 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses