Description
The vulnerability of hard-coded default credentials in QSAN SANOS allows unauthenticated remote attackers to obtain administrator’s permission and execute arbitrary functions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
No analysis available yet.
Remediation
Vendor Solution
QSAN SANOS v2.0.1
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19381 | The vulnerability of hard-coded default credentials in QSAN SANOS allows unauthenticated remote attackers to obtain administrator’s permission and execute arbitrary functions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-4892-768d9-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T16:38:41.859Z
Reserved: 2021-05-10T00:00:00.000Z
Link: CVE-2021-32535
No data.
Status : Modified
Published: 2021-07-07T14:15:12.100
Modified: 2024-11-21T06:07:13.190
Link: CVE-2021-32535
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD