A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a could allow the collection of SANnav database password in the system audit logs. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the Brocade SANnav database password.
History

Tue, 03 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a could allow the collection of SANnav database password in the system audit logs. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the Brocade SANnav database password.
Title Plain password is generated in the audit logs while executing update-reports-purge-settings.sh script with Brocade SANnav before 2.4.0a
Weaknesses CWE-209
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: brocade

Published:

Updated: 2026-02-03T01:58:46.979Z

Reserved: 2025-11-05T20:06:40.271Z

Link: CVE-2025-12773

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-03T01:15:57.610

Modified: 2026-02-03T01:15:57.610

Link: CVE-2025-12773

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.