Description
Use of MAC address as an authenticated password in QSAN Storage Manager, XEVO, SANOS allows local attackers to escalate privileges. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
No analysis available yet.
Remediation
Vendor Solution
Please refer to QSANS's recommended measures
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19367 | Use of MAC address as an authenticated password in QSAN Storage Manager, XEVO, SANOS allows local attackers to escalate privileges. Suggest contacting with QSAN and refer to recommendations in QSAN Document. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-4877-7b696-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T18:04:06.277Z
Reserved: 2021-05-10T00:00:00.000Z
Link: CVE-2021-32521
No data.
Status : Modified
Published: 2021-07-07T14:15:11.143
Modified: 2024-11-21T06:07:11.577
Link: CVE-2021-32521
No data.
OpenCVE Enrichment
No data.
EUVD