Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support save logs. When OOM occurs on a Brocade SANnav server, the call stack trace for the Brocade switch is also collected in the heap dump file which contains this switch password in clear text. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the switch admin password.
History

Mon, 02 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support save logs. When OOM occurs on a Brocade SANnav server, the call stack trace for the Brocade switch is also collected in the heap dump file which contains this switch password in clear text. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the switch admin password.
Title Plaintext Switch admin login password is seen in Brocade SANnav support save
Weaknesses CWE-312
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: brocade

Published:

Updated: 2026-02-03T01:59:41.935Z

Reserved: 2025-11-05T20:05:22.781Z

Link: CVE-2025-12772

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-02T23:15:58.453

Modified: 2026-02-02T23:15:58.453

Link: CVE-2025-12772

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.