The same hard-coded password in QSAN Storage Manager's in the firmware allows remote malicious users to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
qsan storage manager |