{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T16:42:11.100","vulnerabilities":[{"cve":{"id":"CVE-2021-32519","sourceIdentifier":"twcert@cert.org.tw","published":"2021-07-07T14:15:11.020","lastModified":"2024-11-21T06:07:11.360","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0."},{"lang":"es","value":"La vulnerabilidad del uso del hash de la contraseña con un esfuerzo computacional insuficiente en QSAN Storage Manager, XEVO, SANOS permite a los atacantes remotos recuperar la contraseña de texto plano mediante la fuerza bruta del hash MD5. La vulnerabilidad referida ha sido resuelta con la versión actualizada de QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, y QSAN SANOS v2.1.0"}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-916"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qsan:sanos:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.0","matchCriteriaId":"85D922DA-3B01-496D-8362-1E0745AEA2BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:qsan:storage_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3.2","matchCriteriaId":"5C3415DB-28CC-420A-9145-246A0E9952CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:qsan:xevo:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.0","matchCriteriaId":"8B44B494-BE7E-4B21-841C-CED3EB89A81E"}]}]}],"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}