Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12773: CWE-209 Generation of Error Message Containing Sensitive Information in Brocade SANnav

0
High
VulnerabilityCVE-2025-12773cvecve-2025-12773cwe-209
Published: Tue Feb 03 2026 (02/03/2026, 00:38:08 UTC)
Source: CVE Database V5
Vendor/Project: Brocade
Product: SANnav

Description

A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a could allow the collection of SANnav database password in the system audit logs. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the Brocade SANnav database password.

AI-Powered Analysis

AILast updated: 02/03/2026, 01:14:46 UTC

Technical Analysis

CVE-2025-12773 is a vulnerability identified in Brocade SANnav, a storage area network management product, specifically in versions before 2.4.0a. The flaw resides in the update-reports-purge-settings.sh script, which logs sensitive information, including the SANnav database password, into system audit logs. This is a classic example of CWE-209, where error messages or logs inadvertently expose sensitive data. The vulnerability allows a remote attacker who is authenticated with high privileges and has access to the audit logs to retrieve the database password. The CVSS 4.0 score of 7.1 reflects a high severity, considering the attack vector is local (AV:L), requires low attack complexity (AC:L), no additional authentication (AT:N), but does require privileged access (PR:H) and user interaction (UI:P). The vulnerability impacts confidentiality critically, as the database password exposure can lead to unauthorized access to SANnav’s database, potentially compromising the entire SAN management environment. The vulnerability does not affect integrity or availability directly but could be leveraged for further attacks. No public exploits are known, but the sensitive nature of the data exposed makes this a significant risk. The vulnerability was reserved in November 2025 and published in February 2026, indicating recent discovery and disclosure. Brocade SANnav is widely used in enterprise SAN environments to manage storage networks, making this vulnerability relevant for organizations relying on Brocade’s storage solutions.

Potential Impact

For European organizations, the exposure of the SANnav database password could lead to unauthorized access to critical storage management systems, risking data confidentiality and potentially enabling attackers to manipulate or disrupt storage operations. This could affect sectors with heavy reliance on SAN infrastructure, such as finance, telecommunications, healthcare, and government agencies. The breach of storage management credentials could facilitate lateral movement within networks, data exfiltration, or sabotage of storage configurations, impacting business continuity and regulatory compliance (e.g., GDPR). Given the high privileges required to exploit the vulnerability, insider threats or compromised administrative accounts pose the greatest risk. The impact is heightened in environments where audit logs are not adequately protected or monitored, increasing the likelihood of credential theft. Additionally, the lack of known exploits does not diminish the urgency, as attackers could develop tools to leverage this vulnerability once disclosed.

Mitigation Recommendations

Organizations should immediately upgrade Brocade SANnav to version 2.4.0a or later, where this vulnerability is addressed. Until patching is possible, restrict access to system audit logs strictly to trusted administrators and implement robust access controls and monitoring on these logs to detect unauthorized access attempts. Review and harden logging configurations to avoid sensitive data exposure. Employ network segmentation to limit access to SANnav management interfaces and audit logs. Conduct regular audits of privileged accounts and enforce the principle of least privilege to reduce the risk of credential misuse. Implement multi-factor authentication for all administrative access to SANnav. Additionally, monitor for unusual activities in audit logs and SANnav usage patterns that could indicate exploitation attempts. Maintain an incident response plan tailored to storage infrastructure compromise scenarios. Finally, ensure backups and recovery procedures are tested to mitigate potential impacts from any subsequent attacks leveraging this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
brocade
Date Reserved
2025-11-05T20:06:40.271Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69814899f9fa50a62f6fcd99

Added to database: 2/3/2026, 1:00:09 AM

Last enriched: 2/3/2026, 1:14:46 AM

Last updated: 2/3/2026, 2:39:42 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats