Use of MAC address as an authenticated password in QSAN Storage Manager, XEVO, SANOS allows local attackers to escalate privileges. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19367 | Use of MAC address as an authenticated password in QSAN Storage Manager, XEVO, SANOS allows local attackers to escalate privileges. Suggest contacting with QSAN and refer to recommendations in QSAN Document. |
Fixes
Solution
Please refer to QSANS's recommended measures
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-4877-7b696-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T18:04:06.277Z
Reserved: 2021-05-10T00:00:00
Link: CVE-2021-32521
No data.
Status : Modified
Published: 2021-07-07T14:15:11.143
Modified: 2024-11-21T06:07:11.577
Link: CVE-2021-32521
No data.
OpenCVE Enrichment
No data.
EUVD