CVE-2025-6390
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-08-27
Assigner: Brocade Communications Systems, LLC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| broadcom | brocade_sannav | to 2.4.0a (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-497 | The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in Brocade SANnav before version 2.4.0a, where passwords and pbe keys are logged in the Brocade SANnav server audit logs after installation and under specific conditions. These audit logs are on the local server VM and are accessible only to the server administrator of the host server, not to SANnav administrators or users.
How can this vulnerability impact me? :
The vulnerability can lead to exposure of sensitive information such as passwords and pbe keys to the server administrator of the host server, potentially allowing unauthorized access or misuse of credentials if the server admin is malicious or compromised. However, SANnav admins and users do not have access to these logs.