Cleartext storage of sensitive information in Brocade SANnav server audit logs. (CVE-2025-6390)

Brocade SANnav

0 more products

35909

10 July 2025

08 July 2025

CLOSED

MEDIUM

5.1 - CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

CVE-2025-6390

Brocade Security Advisory ID BSA-2025-3038
Component Keystorage
   

CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere

Summary

Brocade SANnav before SANnav 2.4.0a logs passwords and pbe keys in the Brocade SANnav server audit logs after installation and under specific conditions. These audit logs are the local server VM’s audit logs and are not controlled by SANnav. These logs are only visible to the server admin of the host server and are not visible to the SANnav admin or any SANnav user.

Description

Brocade PSIRT has identified several conditions.

  1. After Brocade SANnav installation, scp/sftp & security passwords, database passwords, are logged in the system audit logs.
  2. Brocade SANnav also stores DB passwords in the audit logs while changing DB passwords.
  3. When Setting Up Disaster Recovery between two SANnav servers with VM, Bare Metal (new), and OVA deployments, the PBE key is logged in the  Brocade SANnav servers audit logs for both the Primary Node and the Standby Node.

Products Affected

  • Brocade SANnav versions before 2.4.0a  (both  SANnav standard deployments and Brocade SANnav base OS (OVA deployment))

Products Confirmed Not Affected

  • Brocade Fabric OS 
  • Brocade ASCG

Solution

  • Security update provided in Brocade SANnav 2.4.0a

Credit

  • This vulnerability was discovered during internal testing

Revision History

Version

Change

Date

1.0

Initial Publication

July 8, 2025

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.