Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 03 Mar 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom sannav |
|
| CPEs | cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Broadcom
Broadcom sannav |
|
| Metrics |
cvssV3_1
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Brocade
Brocade sannav |
|
| Vendors & Products |
Brocade
Brocade sannav |
Tue, 03 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a could allow the collection of SANnav database password in the system audit logs. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the Brocade SANnav database password. | |
| Title | Plain password is generated in the audit logs while executing update-reports-purge-settings.sh script with Brocade SANnav before 2.4.0a | |
| Weaknesses | CWE-209 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: brocade
Published:
Updated: 2026-02-03T20:46:49.012Z
Reserved: 2025-11-05T20:06:40.271Z
Link: CVE-2025-12773
Updated: 2026-02-03T20:45:42.345Z
Status : Analyzed
Published: 2026-02-03T01:15:57.610
Modified: 2026-03-03T00:59:32.217
Link: CVE-2025-12773
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:14:29Z