CVE-2021-32525
QSAN Storage Manager - Use of Hard-coded Password-2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
La misma contraseña codificada en el firmware de QSAN Storage Manager permite a los atacantes remotos acceder a la interfaz de control con las credenciales del administrador, introduciendo la contraseña codificada en el modo de depuración para ejecutar las instrucciones restringidas del sistema. La referida vulnerabilidad ha sido resuelta con la versión actualizada de QSAN Storage Manager versión v3.3.3
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-05-10 CVE Reserved
- 2021-07-07 CVE Published
- 2023-09-29 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-259: Use of Hard-coded Password
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-4881-959d3-1.html | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qsan Search vendor "Qsan" | Storage Manager Search vendor "Qsan" for product "Storage Manager" | < 3.3.1 Search vendor "Qsan" for product "Storage Manager" and version " < 3.3.1" | - |
Affected
|