HomeBroadcomCVE-2025-12679

CVE-2025-12679

HIGH
7.1CVSS
Published: 2026-02-02
Updated: 2026-03-03
AI Analysis

Description

A vulnerability in Brocade SANnav before 2.4.0b prints the Password-Based Encryption (PBE) key in plaintext in the system audit log file. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the pbe key. Note: The vulnerability is only triggered during a migration and not in a new installation. The system audit logs are accessible only to a privileged user on the server. These audit logs are the local server VM’s audit logs and are not controlled by SANnav. These logs are only visible to the server admin of the host server and are not visible to the SANnav admin or any SANnav user.

CVSS Metrics

Vector
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
local
Complexity
low
Privileges
high
User Action
passive
Confidentiality
undefined
Integrity
undefined
Availability
undefined
Weaknesses
CWE-312

Metadata

Primary Vendor
BROADCOM
Published
2/2/2026
Last Modified
3/3/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

broadcom : sannav

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-12679 | HIGH Severity | CVEDatabase.com | CVEDatabase.com