cve-2021-32519
Vulnerability from cvelistv5
Published
2021-07-07 14:12
Modified
2024-09-16 19:11
Severity ?
EPSS score ?
Summary
Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0.
References
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html | Third Party Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:29.962Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Storage Manager", "vendor": "QSAN", "versions": [ { "lessThanOrEqual": "3.3.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "XEVO", "vendor": "QSAN", "versions": [ { "lessThan": "1.2.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "SANOS", "vendor": "QSAN", "versions": [ { "status": "affected", "version": "2.0.0" } ] } ], "datePublic": "2021-07-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-22T10:32:43", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html" } ], "solutions": [ { "lang": "en", "value": "QSAN Storage Manager v3.3.2\nQSAN XEVO v2.1.0\nQSAN SANOS v2.1.0" } ], "source": { "advisory": "TVN-202104024", "discovery": "EXTERNAL" }, "title": "QSAN Storage Manager, XEVO, SANOS - Use of Password Hash With Insufficient Computational Effort", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "AKA": "TWCERT/CC", "ASSIGNER": "cve@cert.org.tw", "DATE_PUBLIC": "2021-07-07T11:33:00.000Z", "ID": "CVE-2021-32519", "STATE": "PUBLIC", "TITLE": "QSAN Storage Manager, XEVO, SANOS - Use of Password Hash With Insufficient Computational Effort" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Storage Manager", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "3.3.1" } ] } }, { "product_name": "XEVO", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.2.0" } ] } }, { "product_name": "SANOS", "version": { "version_data": [ { "version_value": "2.0.0" } ] } } ] }, "vendor_name": "QSAN" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-916 Use of Password Hash With Insufficient Computational Effort" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html", "refsource": "MISC", "url": "https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html" } ] }, "solution": [ { "lang": "en", "value": "QSAN Storage Manager v3.3.2\nQSAN XEVO v2.1.0\nQSAN SANOS v2.1.0" } ], "source": { "advisory": "TVN-202104024", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2021-32519", "datePublished": "2021-07-07T14:12:00.118740Z", "dateReserved": "2021-05-10T00:00:00", "dateUpdated": "2024-09-16T19:11:01.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-32519\",\"sourceIdentifier\":\"twcert@cert.org.tw\",\"published\":\"2021-07-07T14:15:11.020\",\"lastModified\":\"2024-11-21T06:07:11.360\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0.\"},{\"lang\":\"es\",\"value\":\"La vulnerabilidad del uso del hash de la contrase\u00f1a con un esfuerzo computacional insuficiente en QSAN Storage Manager, XEVO, SANOS permite a los atacantes remotos recuperar la contrase\u00f1a de texto plano mediante la fuerza bruta del hash MD5. La vulnerabilidad referida ha sido resuelta con la versi\u00f3n actualizada de QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, y QSAN SANOS v2.1.0\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"twcert@cert.org.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"twcert@cert.org.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-916\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qsan:sanos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1.0\",\"matchCriteriaId\":\"85D922DA-3B01-496D-8362-1E0745AEA2BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qsan:storage_manager:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.3.2\",\"matchCriteriaId\":\"5C3415DB-28CC-420A-9145-246A0E9952CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qsan:xevo:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1.0\",\"matchCriteriaId\":\"8B44B494-BE7E-4B21-841C-CED3EB89A81E\"}]}]}],\"references\":[{\"url\":\"https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html\",\"source\":\"twcert@cert.org.tw\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.