Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12774: CWE-312 Cleartext Storage of Sensitive Information in Brocade SANnav

0
Medium
VulnerabilityCVE-2025-12774cvecve-2025-12774cwe-312
Published: Tue Feb 03 2026 (02/03/2026, 01:28:43 UTC)
Source: CVE Database V5
Vendor/Project: Brocade
Product: SANnav

Description

CVE-2025-12774 is a medium severity vulnerability in Brocade SANnav versions before 3. 0 involving cleartext storage of sensitive information within the SANnav support save file. The issue arises from a migration script that collects database SQL queries and stores them in the support save file, which can be accessed by an attacker with file access. This exposure could reveal sensitive details such as database table structures and encrypted passwords. Exploitation requires local access to the support save file and high privileges on the system, with no user interaction needed. While no known exploits are currently reported in the wild, the vulnerability poses a risk to confidentiality if the support save file is improperly handled or accessed by unauthorized users. European organizations using Brocade SANnav for storage area network management should be aware of this risk and implement strict access controls and update to version 3. 0 or later when available.

AI-Powered Analysis

AILast updated: 02/10/2026, 11:04:28 UTC

Technical Analysis

CVE-2025-12774 is a vulnerability identified in Brocade SANnav, a storage area network management tool, specifically affecting versions prior to 3.0. The root cause is a migration script that, during its operation, collects database SQL queries and stores them in the SANnav support save file. This file, intended for diagnostic and support purposes, inadvertently contains sensitive information including database table details and encrypted passwords. An attacker who gains access to this support save file can extract this information, potentially facilitating further attacks or unauthorized data access. The vulnerability is classified under CWE-312, indicating cleartext storage of sensitive information. Exploitation requires the attacker to have local access to the system with high privileges to obtain the support save file, but does not require user interaction or authentication beyond that. The CVSS 4.0 base score is 4.6 (medium severity), reflecting the limited attack vector (local), but low complexity and no user interaction. No public exploits have been reported to date. The vulnerability impacts confidentiality primarily, with no direct impact on integrity or availability. The exposure of encrypted passwords, while not immediately compromising, could be leveraged if encryption is weak or keys are compromised elsewhere. This vulnerability highlights the importance of secure handling of diagnostic files and sensitive data within enterprise storage management solutions.

Potential Impact

For European organizations, especially those operating large-scale storage area networks using Brocade SANnav, this vulnerability could lead to unauthorized disclosure of sensitive infrastructure information. Exposure of database structures and encrypted passwords could facilitate lateral movement or privilege escalation if attackers combine this information with other vulnerabilities or compromised credentials. Confidentiality breaches could impact compliance with GDPR and other data protection regulations, potentially resulting in legal and financial penalties. Organizations in sectors with critical data storage needs, such as finance, healthcare, and government, may face increased risk due to the sensitivity of their stored data. Although exploitation requires local access with high privileges, insider threats or attackers who have already compromised a system could leverage this vulnerability to deepen their access. The lack of known exploits reduces immediate risk, but the presence of sensitive information in support files remains a persistent security concern.

Mitigation Recommendations

European organizations should implement strict access controls on Brocade SANnav support save files, ensuring only authorized personnel with a legitimate need can access them. Regular audits and monitoring of file access can help detect unauthorized attempts. It is critical to upgrade Brocade SANnav to version 3.0 or later once available, as this version addresses the vulnerability. Until patching is possible, organizations should minimize generation and distribution of support save files and securely delete them after use. Encrypting support save files at rest and in transit can add an additional layer of protection. Additionally, reviewing and hardening privilege management policies to limit high privilege access reduces the risk of exploitation. Organizations should also verify the strength of password encryption mechanisms used by SANnav and consider rotating credentials if exposure is suspected. Finally, integrating this vulnerability into incident response plans will prepare teams to respond promptly if exploitation is detected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
brocade
Date Reserved
2025-11-05T20:07:09.482Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69815a2df9fa50a62f75462c

Added to database: 2/3/2026, 2:15:09 AM

Last enriched: 2/10/2026, 11:04:28 AM

Last updated: 3/20/2026, 10:25:43 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses