The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-19371 The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
Fixes

Solution

QSAN Storage Manager v3.3.3


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-09-17T04:24:33.071Z

Reserved: 2021-05-10T00:00:00

Link: CVE-2021-32525

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-07T14:15:11.400

Modified: 2024-11-21T06:07:12.040

Link: CVE-2021-32525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.