Description
The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
No analysis available yet.
Remediation
Vendor Solution
QSAN Storage Manager v3.3.3
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19371 | The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-4881-959d3-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-17T04:24:33.071Z
Reserved: 2021-05-10T00:00:00.000Z
Link: CVE-2021-32525
No data.
Status : Modified
Published: 2021-07-07T14:15:11.400
Modified: 2024-11-21T06:07:12.040
Link: CVE-2021-32525
No data.
OpenCVE Enrichment
No data.
EUVD