CVE-2025-1053

4.9 MEDIUM

📋 TL;DR

During SANnav installation or upgrade error conditions, the encryption key can be written to and retrieved from a supportsave file. Attackers with privileged database access could use this key to decrypt passwords used by SANnav. This affects Brocade SANnav deployments where supportsave files are accessible.

💻 Affected Systems

Products:
  • Brocade SANnav
Versions: Specific versions not detailed in advisory; check Broadcom advisory for exact affected versions
Operating Systems: Not specified, likely various SANnav-supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers during installation/upgrade error conditions; requires supportsave file generation and privileged database access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of SANnav credentials leading to unauthorized access to SAN management infrastructure, potential data exfiltration, and disruption of storage operations.

🟠

Likely Case

Privileged attackers with database access obtain encryption keys and decrypt stored passwords, gaining elevated access within the SANnav environment.

🟢

If Mitigated

Limited impact due to restricted database access, proper supportsave file handling, and encryption key rotation.

🌐 Internet-Facing: LOW - Requires privileged database access and supportsave file access, unlikely to be directly internet-exposed.
🏢 Internal Only: MEDIUM - Internal attackers with database privileges could exploit this to escalate privileges within SAN management systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires privileged database access and ability to obtain supportsave files; exploitation depends on specific error conditions during installation/upgrade.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Broadcom advisory for specific fixed versions

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25399

Restart Required: Yes

Instructions:

1. Review Broadcom advisory for affected versions. 2. Apply recommended patches/updates from Broadcom. 3. Restart SANnav services as required. 4. Verify encryption key handling in supportsave files.

🔧 Temporary Workarounds

Restrict supportsave file access

linux

Limit access to supportsave files to authorized personnel only and ensure proper file permissions.

chmod 600 /path/to/supportsave/files
chown root:root /path/to/supportsave/files

Monitor database access

all

Implement strict access controls and monitoring for SANnav database privileged accounts.

🧯 If You Can't Patch

  • Implement strict access controls on SANnav database and supportsave files
  • Monitor for unauthorized access attempts and review supportsave file generation logs

🔍 How to Verify

Check if Vulnerable:

Check SANnav version against Broadcom advisory; review supportsave files for encryption key exposure during error conditions.

Check Version:

Check SANnav management interface or documentation for version command specific to your deployment

Verify Fix Applied:

Verify SANnav is updated to patched version; test supportsave generation during error conditions to ensure encryption keys are not exposed.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized database access attempts
  • Supportsave file generation during installation/upgrade errors
  • Access to supportsave files by unauthorized users

Network Indicators:

  • Unusual database queries from unexpected sources
  • File transfers of supportsave files to unauthorized locations

SIEM Query:

source="sannav" AND (event="supportsave_generation" OR event="database_access") AND user NOT IN authorized_users

🔗 References

📤 Share & Export