CVE-2025-12774
📋 TL;DR
A vulnerability in Brocade SANnav migration scripts before version 3.0 allows sensitive database information to be captured in support save files. Attackers with access to these files can extract database table details and encrypted passwords. This affects Brocade SANnav users running versions before 3.0.
💻 Affected Systems
- Brocade SANnav
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain encrypted passwords and database schema information, potentially enabling credential cracking and further database exploitation.
Likely Case
Information disclosure of database structure and encrypted credentials, facilitating targeted attacks against the SANnav system.
If Mitigated
Limited exposure if support save files are properly secured and access controlled.
🎯 Exploit Status
Exploitation requires access to the support save file, which may require some level of system access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.0 or later
Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36848
Restart Required: Yes
Instructions:
1. Download Brocade SANnav version 3.0 or later from Broadcom support portal. 2. Follow the official upgrade/migration guide. 3. Apply the update to all affected SANnav instances. 4. Restart SANnav services.
🔧 Temporary Workarounds
Secure Support Save Files
linuxRestrict access to SANnav support save files using file system permissions.
chmod 600 /path/to/support_save_files/*
chown root:root /path/to/support_save_files/*
Limit Support Save File Generation
allOnly generate support save files when absolutely necessary and delete them immediately after use.
🧯 If You Can't Patch
- Implement strict access controls on directories containing support save files
- Monitor and audit access to support save files and alert on unauthorized access
🔍 How to Verify
Check if Vulnerable:
Check SANnav version via web interface or CLI. Versions before 3.0 are vulnerable.
Check Version:
Check SANnav web interface or consult SANnav documentation for version check command
Verify Fix Applied:
Confirm SANnav version is 3.0 or later and verify support save files no longer contain sensitive database queries.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to support save file directories
- Unexpected generation of support save files
Network Indicators:
- Unusual file transfers of large support save files
SIEM Query:
source="*sanav*" AND (event="file_access" OR event="file_download") AND file_path="*support*" AND file_size>100MB