Plaintext Switch admin login password is seen in Brocade SANnav support save (CVE-2025-12772)
36846
27 January 2026
27 January 2026
CLOSED
HIGH
8.5 High - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H
CVE-2025-12772
|
Brocade Security Advisory ID |
BSA-2026-3255 |
|
Component |
Fabric OS Switch admin password |
|
CWE |
CWE-250 |
|
|
|
Summary
Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support save logs.
When OOM occurs on a Brocade SANnav server, the call stack trace for the Brocade switch is also collected in the heap dump file which contains this switch password in clear text. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the switch admin password.
Products Affected
- Brocade SANnav before 2.4.0b
Products Confirmed Not Affected
- Brocade Fabric OS
- Brocade ASCG
Solution
- Security update provided in Brocade SANnav 3.0 and 2.4.0b
Credit
The vulnerability was discovered during internal testing.
Revision History
|
Version |
Change |
Date |
|
1.0 |
Initial Publication |
1/27/2026 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.