Description
The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
Published: 2021-07-07
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

QSAN Storage Manager v3.3.3

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-19371 The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
History

No history.

Subscriptions

Qsan Storage Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-09-17T04:24:33.071Z

Reserved: 2021-05-10T00:00:00.000Z

Link: CVE-2021-32525

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-07T14:15:11.400

Modified: 2024-11-21T06:07:12.040

Link: CVE-2021-32525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses