Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2021-32529

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
Command injection vulnerability in QSAN XEVO, SANOS allows remote unauthenticated attackers to execute arbitrary commands. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
0
Attacker Value
Unknown

CVE-2021-32533

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
The QSAN SANOS setting page does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
0
Attacker Value
Unknown

CVE-2021-32535

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
The vulnerability of hard-coded default credentials in QSAN SANOS allows unauthenticated remote attackers to obtain administrator’s permission and execute arbitrary functions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
0
Attacker Value
Unknown

CVE-2021-32522

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
Improper restriction of excessive authentication attempts vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to discover users’ credentials and obtain access via a brute force attack. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
0
Attacker Value
Unknown

CVE-2021-32534

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
0
Attacker Value
Unknown

CVE-2021-32521

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
Use of MAC address as an authenticated password in QSAN Storage Manager, XEVO, SANOS allows local attackers to escalate privileges. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
Attacker Value
Unknown

CVE-2021-32519

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0.