Description
Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0.
No analysis available yet.
Remediation
Vendor Solution
QSAN Storage Manager v3.3.2 QSAN XEVO v2.1.0 QSAN SANOS v2.1.0
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19365 | Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T19:11:01.631Z
Reserved: 2021-05-10T00:00:00.000Z
Link: CVE-2021-32519
No data.
Status : Modified
Published: 2021-07-07T14:15:11.020
Modified: 2024-11-21T06:07:11.360
Link: CVE-2021-32519
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD