Описание
The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.3.1 (исключая)
cpe:2.3:a:qsan:storage_manager:*:*:*:*:*:*:*:*
EPSS
Процентиль: 76%
0.0096
Низкий
9.1 Critical
CVSS3
7.2 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-259
CWE-798
Связанные уязвимости
github
больше 3 лет назад
The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions.
EPSS
Процентиль: 76%
0.0096
Низкий
9.1 Critical
CVSS3
7.2 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-259
CWE-798