Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published: 2021-07-07T14:12:00.118740Z

Updated: 2024-09-16T19:11:01.631Z

Reserved: 2021-05-10T00:00:00

Link: CVE-2021-32519

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-07-07T14:15:11.020

Modified: 2021-09-20T18:33:39.207

Link: CVE-2021-32519

cve-icon Redhat

No data.