Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0.
| Software | From | Fixed in |
|---|---|---|
| qsan / xevo | - | 2.1.0 |
| qsan / sanos | - | 2.1.0 |
| qsan / storage_manager | - | 3.3.2 |