Brocade SANnav before SANnav 2.4.0a logs plaintext passphrases in the Brocade SANnav host server audit logs while executing OpenSSL command using a passphrase from the command line or while providing the passphrase through a temporary file. These audit logs are the local server VM’s audit logs and are not controlled by SANnav. These logs are only visible to the server admin of the host server and are not visible to the SANnav admin or any SANnav user.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00013}

epss

{'score': 0.00017}


Fri, 11 Jul 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00013}


Thu, 10 Jul 2025 21:00:00 +0000

Type Values Removed Values Added
Description Brocade SANnav before SANnav 2.4.0a logs plaintext passphrases in the Brocade SANnav host server audit logs while executing OpenSSL command using a passphrase from the command line or while providing the passphrase through a temporary file. These audit logs are the local server VM’s audit logs and are not controlled by SANnav. These logs are only visible to the server admin of the host server and are not visible to the SANnav admin or any SANnav user.
Title Plaintext security passwords are logged in the audit logs while executing openssl cmd
Weaknesses CWE-497
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: brocade

Published: 2025-07-10T20:41:20.151Z

Updated: 2025-07-11T16:59:42.253Z

Reserved: 2025-05-13T18:33:10.828Z

Link: CVE-2025-4662

cve-icon Vulnrichment

Updated: 2025-07-11T16:59:37.335Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-10T21:15:28.910

Modified: 2025-07-15T13:14:49.980

Link: CVE-2025-4662

cve-icon Redhat

No data.