Curl vulnerabilities detected in SANnav images (CVE-2025-4947, CVE-2025-5025)
36816
27 January 2026
27 January 2026
CLOSED
LOW
Varies
CVE-2025-4947, CVE-2025-5025
|
Brocade Security Advisory ID |
BSA-2026-3016 |
|
Component |
libcurl |
|
|
|
Summary
The Curl vulnerabilities identified are located within open source components utilized by Brocade SANnav, however the vulnerable code is not compiled into the final product. As a part of good security practice, the open source component was updated in the SANnav 3.0.0 release.
CVE-2025-4947
libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.
CVE-2025-5025
libcurl supports pinning of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.
Products Affected
- No Brocade products are affected
Products Not Affected
- Brocade SANnav versions before SANnav 3.0.0 contain the vulnerable component, but are exploitable [VEX Justification: Vulnerable_code_not_present]
- Brocade Fabric OS
[VEX Justification: Component_not_present] - Brocade ASCG
[VEX Justification: Component_not_present]
Solution
- While not exploitable, a security update is included in Brocade SANnav 3.0.0
Revision History
|
Version |
Change |
Date |
|
1.0 |
Initial Publication |
January 27, 2026 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.