First published: Fri Feb 14 2025(Updated: )
Under certain error conditions at time of SANnav installation or upgrade, the encryption key can be written into and obtained from a Brocade SANnav supportsave. An attacker with privileged access to the Brocade SANnav database could use the encryption key to obtain passwords used by Brocade SANnav.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom SANnav OVA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1053 has been assigned a high severity rating due to the risk of privileged access to sensitive encryption keys.
To fix CVE-2025-1053, ensure that your Brocade SANnav installation is updated to the latest version that addresses the vulnerability.
CVE-2025-1053 affects users of Brocade SANnav who install or upgrade the software under specific error conditions.
Exploitation of CVE-2025-1053 requires an attacker to have privileged access to the Brocade SANnav database.
An attacker leveraging CVE-2025-1053 could use the compromised encryption key to retrieve passwords stored in the Brocade SANnav database.