Plaintext security passwords are logged in the audit logs while executing openssl cmd (CVE-2025-4662)
35908
10 July 2025
08 July 2025
CLOSED
MEDIUM
5.1 - CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVE-2025-4662
Brocade Security Advisory ID |
BSA-2025-3037 |
Component |
OpenSSL |
|
CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Summary
Brocade SANnav before SANnav 2.4.0a logs plaintext passphrases in the Brocade SANnav host server audit logs while executing OpenSSL command using a passphrase from the command line or while providing the passphrase through a temporary file.
These audit logs are the local server VM’s audit logs and are not controlled by SANnav. These logs are only visible to the server admin of the host server and are not visible to the SANnav admin or any SANnav user.
Products Affected
- Brocade SANnav versions before 2.4.0a (both SANnav standard deployments and Brocade SANnav base OS (OVA deployment))
Products Confirmed Not Affected
- Brocade Fabric OS
- Brocade ASCG
Solution
Security update provided in Brocade SANnav 2.4.0a
Credit
The vulnerability was discovered during internal testing.
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
Jul 8, 2025 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.