Lucene search

K
cvelistTwcertCVELIST:CVE-2021-32525
HistoryJul 07, 2021 - 2:12 p.m.

CVE-2021-32525 QSAN Storage Manager - Use of Hard-coded Password-2

2021-07-0714:12:09
CWE-259
twcert
www.cve.org
4
qsan storage manager
hard-coded password
remote attackers
firmware
administrator credentials
debug mode
system instructions
vulnerability
updated version

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.005

Percentile

76.4%

The same hard-coded password in QSAN Storage Manager’s in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CNA Affected

[
  {
    "product": "Storage Manager",
    "vendor": "QSAN",
    "versions": [
      {
        "lessThanOrEqual": "3.3.1",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.005

Percentile

76.4%

Related for CVELIST:CVE-2021-32525