Description
CalInvocationHandler in Brocade SANnav before 2.3.1b logs sensitive information in clear text. The vulnerability could allow an authenticated, local attacker to view Brocade Fabric OS switch sensitive information in clear text. An attacker with administrative privileges could retrieve sensitive information including passwords; SNMP responses that contain AuthSecret and PrivSecret after collecting a “supportsave” or getting access to an already collected “supportsave”. NOTE: this issue exists because of an incomplete fix for CVE-2024-29952
CVSS Metrics
- Vector
- CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N
- Attack Vector
- local
- Complexity
- low
- Privileges
- high
- User Action
- required
- Scope
- changed
- Confidentiality
- high
- Integrity
- none
- Availability
- none
- Weaknesses
- CWE-312
Metadata
- Primary Vendor
- BROADCOM
- Published
- 2/14/2025
- Last Modified
- 8/26/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
broadcom : brocade_sannav
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.