The vulnerability of hard-coded default credentials in QSAN SANOS allows unauthenticated remote attackers to obtain administrator’s permission and execute arbitrary functions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-4892-768d9-1.html | Third Party Advisory |
https://www.twcert.org.tw/tw/cp-132-4892-768d9-1.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.twcert.org.tw/tw/cp-132-4892-768d9-1.html - Third Party Advisory |
Information
Published : 2021-07-07 14:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32535
Mitre link : CVE-2021-32535
CVE.ORG link : CVE-2021-32535
JSON object : View
Products Affected
qsan
- sanos
CWE
CWE-798
Use of Hard-coded Credentials