The vulnerability of hard-coded default credentials in QSAN SANOS allows unauthenticated remote attackers to obtain administrator’s permission and execute arbitrary functions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-4892-768d9-1.html | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: twcert
Published: 2021-07-07T00:00:00
Updated: 2021-07-22T10:33:05
Reserved: 2021-05-10T00:00:00
Link: CVE-2021-32535
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-07-07T14:15:12.100
Modified: 2021-09-20T12:37:23.263
Link: CVE-2021-32535
JSON object: View
Redhat Information
No data.
CWE