The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
References
Link Resource
https://www.twcert.org.tw/tw/cp-132-4881-959d3-1.html Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: twcert

Published: 2021-07-07T00:00:00

Updated: 2021-07-22T10:32:52

Reserved: 2021-05-10T00:00:00


Link: CVE-2021-32525

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-07-07T14:15:11.400

Modified: 2021-09-20T12:35:39.287


Link: CVE-2021-32525

JSON object: View

cve-icon Redhat Information

No data.