Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12772: CWE-312 Cleartext Storage of Sensitive Information in Brocade SANnav

0
High
VulnerabilityCVE-2025-12772cvecve-2025-12772cwe-312
Published: Mon Feb 02 2026 (02/02/2026, 22:41:13 UTC)
Source: CVE Database V5
Vendor/Project: Brocade
Product: SANnav

Description

Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support save logs. When OOM occurs on a Brocade SANnav server, the call stack trace for the Brocade switch is also collected in the heap dump file which contains this switch password in clear text. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the switch admin password.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:45:24 UTC

Technical Analysis

CVE-2025-12772 is a vulnerability affecting Brocade SANnav versions prior to 2.4.0b, involving the cleartext storage of sensitive information, specifically the Brocade Fabric OS Switch admin password. The issue arises when the SANnav server experiences an out-of-memory (OOM) condition, triggering the creation of a heap dump file that includes the call stack trace for the Brocade switch. This call stack trace inadvertently contains the admin password in plaintext. These heap dumps are included in the SANnav support save logs, which can be accessed by users with administrative privileges on the SANnav server. An attacker with remote authenticated admin access can retrieve these logs and extract the switch password, potentially allowing unauthorized control over the SAN fabric switches. The vulnerability is classified under CWE-312 (Cleartext Storage of Sensitive Information), indicating poor handling of sensitive credentials. The CVSS v4.0 score of 8.5 (high severity) reflects the vulnerability's network attack vector, low attack complexity, no requirement for additional privileges beyond admin, and no user interaction needed. The impact on confidentiality is high, as the password exposure can lead to further compromise of the storage network. Integrity is also at risk since an attacker could manipulate SAN switch configurations. Availability impact is not significant. No patches were linked in the provided data, but upgrading to SANnav 2.4.0b or later is the recommended remediation. No known exploits have been reported in the wild, but the vulnerability's nature makes it a critical concern for environments relying on Brocade SANnav for SAN management.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of storage area network (SAN) environments managed by Brocade SANnav. Exposure of the Fabric OS Switch admin password can lead to unauthorized access and control over SAN switches, potentially allowing attackers to disrupt storage operations, manipulate data flows, or exfiltrate sensitive data stored on SAN-attached devices. This could impact critical sectors such as finance, healthcare, manufacturing, and government agencies that rely heavily on SAN infrastructure for data storage and availability. The requirement for authenticated admin access limits the attack surface but also highlights the importance of protecting admin credentials and access controls. If an attacker compromises an admin account, they could leverage this vulnerability to escalate privileges and cause widespread disruption. The lack of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score and sensitive nature of the data involved necessitate urgent attention. Organizations with compliance obligations under GDPR must also consider the implications of potential data breaches resulting from this vulnerability.

Mitigation Recommendations

1. Upgrade Brocade SANnav to version 2.4.0b or later, where this vulnerability is addressed. 2. Restrict administrative access to SANnav servers strictly to trusted personnel and enforce strong authentication mechanisms, such as multi-factor authentication (MFA). 3. Regularly audit and monitor access logs to detect any unauthorized or suspicious admin activity on SANnav. 4. Limit the generation and retention of support save logs containing heap dumps; ensure logs are stored securely with restricted access. 5. Implement network segmentation to isolate SAN management interfaces from general network access, reducing exposure to remote attackers. 6. Rotate Fabric OS Switch admin passwords regularly and immediately after any suspected compromise. 7. Educate administrators about the risks of credential exposure and the importance of safeguarding SANnav admin credentials. 8. Consider deploying endpoint detection and response (EDR) solutions on SANnav servers to detect anomalous behavior indicative of exploitation attempts. 9. Establish incident response procedures specifically addressing SAN infrastructure compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
brocade
Date Reserved
2025-11-05T20:05:22.781Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813002f9fa50a62f63a03c

Added to database: 2/2/2026, 11:15:14 PM

Last enriched: 2/10/2026, 10:45:24 AM

Last updated: 3/23/2026, 10:10:16 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses