Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html |
History
No history.
MITRE
Status: PUBLISHED
Assigner: twcert
Published: 2021-07-07T14:12:00.118740Z
Updated: 2024-09-16T19:11:01.631Z
Reserved: 2021-05-10T00:00:00
Link: CVE-2021-32519
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-07-07T14:15:11.020
Modified: 2024-11-21T06:07:11.360
Link: CVE-2021-32519
Redhat
No data.