CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

broadcom

sannav

20 known vulnerabilities · sorted by CVSS score

CVE-2022-28163
CRITICAL9.8

In Brocade SANnav before Brocade SANnav 2.2.0, multiple endpoints associated with Zone management are susceptible to SQL injection, allowing an attacker to run arbitrary SQL commands.

broadcom / sannav
Network
Published May 6, 2022
CVE-2020-15377
CRITICAL9.8

Webtools in Brocade SANnav before version 2.1.1 allows unauthenticated users to make requests to arbitrary hosts due to a misconfiguration; this is commonly referred to as Server-Side Request Forgery (SSRF).

broadcom / sannav
Network
Published Jun 9, 2021
CVE-2022-28165
HIGH8.8

A vulnerability in the role-based access control (RBAC) functionality of the Brocade SANNav before 2.2.0 could allow an authenticated, remote attacker to access resources that they should not be able to access and perform actions that they should not be able to perform. The vulnerability exists because restrictions are not performed on Server side to ensure the user has required permission before processing requests.

broadcom / sannav
Network
Published May 6, 2022
CVE-2020-15381
HIGH7.5

Brocade SANnav before version 2.1.1 contains an Improper Authentication vulnerability that allows cleartext transmission of authentication credentials of the jmx server.

broadcom / sannav
Network
Published Jun 9, 2021
CVE-2022-28168
HIGH7.5

In Brocade SANnav before Brocade SANnav v2.2.0.2 and Brocade SANnav2.1.1.8, encoded scp-server passwords are stored using Base64 encoding, which could allow an attacker able to access log files to easily decode the passwords.

broadcom / sannav+1
Network
Published Jun 27, 2022
CVE-2025-12774
HIGH7.5

A vulnerability in the migration script for Brocade SANnav before 3.0 could allow the collection of database sql queries in the SANnav support save file. An attacker with access to Brocade SANnav supportsave file, could open the file and then obtain sensitive information such as details of database tables and encrypted passwords.

broadcom / sannav
Network
Published Feb 3, 2026
CVE-2020-15380
HIGH7.5

Brocade SANnav before version 2.1.1 logs account credentials at the ‘trace’ logging level.

broadcom / sannav
Network
Published Jun 9, 2021
CVE-2022-28166
HIGH7.5

In Brocade SANnav version before SANN2.2.0.2 and Brocade SANNav before 2.1.1.8, the implementation of TLS/SSL Server Supports the Use of Static Key Ciphers (ssl-static-key-ciphers) on ports 443 & 18082.

broadcom / sannav+1
Network
Published Jun 27, 2022
CVE-2022-2068
HIGH7.3

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

openssl / openssl+34
Local
Published Jun 21, 2022
CVE-2022-28164
MEDIUM6.5

Brocade SANnav before SANnav 2.2.0 application uses the Blowfish symmetric encryption algorithm for the storage of passwords. This could allow an authenticated attacker to decrypt stored account passwords.

broadcom / sannav
Network
Published May 6, 2022
CVE-2025-12773
MEDIUM6.5

A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a could allow the collection of SANnav database password in the system audit logs. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the Brocade SANnav database password.

broadcom / sannav
Network
Published Feb 3, 2026
CVE-2022-28167
MEDIUM6.5

Brocade SANnav before Brocade SANvav v. 2.2.0.2 and Brocade SANanv v.2.1.1.8 logs the Brocade Fabric OS switch password in plain text in asyncjobscheduler-manager.log

broadcom / sannav+1
Network
Published Jun 27, 2022
CVE-2025-12679
MEDIUM6.5

A vulnerability in Brocade SANnav before 2.4.0b prints the Password-Based Encryption (PBE) key in plaintext in the system audit log file. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the pbe key. Note: The vulnerability is only triggered during a migration and not in a new installation. The system audit logs are accessible only to a privileged user on the server. These audit logs are the local server VM’s audit logs and are not controlled by SANnav. These logs are only visible to the server admin of the host server and are not visible to the SANnav admin or any SANnav user.

broadcom / sannav
Network
Published Feb 2, 2026
CVE-2020-13401
MEDIUM6.0

An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.

docker / engine+4
Network
Published Jun 2, 2020
CVE-2020-15385
MEDIUM5.4

Brocade SANnav before version 2.1.1 allows an authenticated attacker to list directories, and list files without permission. As a result, users without permission can see folders, and hidden files, and can create directories without permission.

broadcom / sannav
Network
Published Jun 9, 2021
CVE-2020-15384
MEDIUM5.3

Brocade SANNav before version 2.1.1 contains an information disclosure vulnerability. Successful exploitation of internal server information in the initial login response header.

broadcom / sannav
Network
Published Jun 9, 2021
CVE-2020-15378
MEDIUM5.3

The OVA version of Brocade SANnav before version 2.1.1 installation with IPv6 networking exposes the docker container ports to the network, increasing the potential attack surface.

broadcom / sannav
Network
Published Jun 9, 2021
CVE-2025-12772
MEDIUM4.9

Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support save logs. When OOM occurs on a Brocade SANnav server, the call stack trace for the Brocade switch is also collected in the heap dump file which contains this switch password in clear text. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the switch admin password.

broadcom / sannav
Network
Published Feb 2, 2026
CVE-2025-12680
MEDIUM4.9

Brocade SANnav before Brocade SANnav 2.4.0b logs database passwords in clear text in the standby SANnav server, after disaster recovery failover. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the database password.

broadcom / sannav
Network
Published Feb 2, 2026
CVE-2022-28162
LOW3.3

Brocade SANnav before version SANnav 2.2.0 logs the REST API Authentication token in plain text.

broadcom / sannav
Local
Published May 9, 2022