CVE-2025-1053

Under certain error conditions at time of SANnav installation or upgrade, the encryption key can be written into and obtained from a Brocade SANnav supportsave. An attacker with privileged access to the Brocade SANnav database could use the encryption key to obtain passwords used by Brocade SANnav.
Configurations

Configuration 1 (hide)

cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*

History

09 Sep 2025, 19:15

Type Values Removed Values Added
CWE CWE-1295 CWE-532

26 Aug 2025, 19:59

Type Values Removed Values Added
References () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25399 - () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25399 - Vendor Advisory
CPE cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*
Summary
  • (es) En determinadas situaciones de error en el momento de la instalación o actualización de SANnav, la clave de cifrado se puede escribir en un archivo de respaldo de Brocade SANnav y obtenerlo de él. Un atacante con acceso privilegiado a la base de datos de Brocade SANnav podría usar la clave de cifrado para obtener las contraseñas utilizadas por Brocade SANnav.
First Time Broadcom
Broadcom brocade Sannav
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9

14 Feb 2025, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-14 04:15

Updated : 2025-09-09 19:15


NVD link : CVE-2025-1053

Mitre link : CVE-2025-1053

CVE.ORG link : CVE-2025-1053


JSON object : View

Products Affected

broadcom

  • brocade_sannav
CWE
CWE-532

Insertion of Sensitive Information into Log File