CVE-2021-32512

9.8 CRITICAL

📋 TL;DR

CVE-2021-32512 is a critical command injection vulnerability in QSAN Storage Manager's QuickInstall component that allows remote unauthenticated attackers to execute arbitrary commands on affected systems. This affects QSAN Storage Manager installations with vulnerable versions exposed to network access. The vulnerability has been patched in version 3.3.3.

💻 Affected Systems

Products:
  • QSAN Storage Manager
Versions: Versions prior to v3.3.3
Operating Systems: All supported OS platforms for QSAN Storage Manager
Default Config Vulnerable: ⚠️ Yes
Notes: QuickInstall component must be accessible via network. Default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with system privileges, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to unauthorized access, data exfiltration, or lateral movement within the network.

🟢

If Mitigated

Limited impact if systems are isolated behind firewalls with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing systems extremely vulnerable to attack.
🏢 Internal Only: HIGH - Even internally, the unauthenticated nature makes this easily exploitable by any internal threat actor.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in parameter filtering, making exploitation straightforward once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.3.3

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-4868-75574-1.html

Restart Required: Yes

Instructions:

1. Download QSAN Storage Manager v3.3.3 from official vendor sources. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the QSAN Storage Manager service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Isolation

linux

Restrict network access to QSAN Storage Manager to only trusted management networks

iptables -A INPUT -p tcp --dport [QSAN_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [QSAN_PORT] -j DROP

Disable QuickInstall Service

linux

Temporarily disable the vulnerable QuickInstall component if not required

systemctl stop [qsan-quickinstall-service]
systemctl disable [qsan-quickinstall-service]

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to block all external access to QSAN Storage Manager
  • Deploy application-level firewalls or WAF rules to filter malicious parameter inputs to QuickInstall endpoints

🔍 How to Verify

Check if Vulnerable:

Check QSAN Storage Manager version via web interface or configuration files. If version is below 3.3.3, system is vulnerable.

Check Version:

Check web interface at https://[QSAN_IP]:[PORT]/admin or examine configuration files for version information

Verify Fix Applied:

Verify version shows 3.3.3 or higher in administration interface and test QuickInstall functionality with safe parameters.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful QuickInstall access
  • Suspicious process creation from QSAN services

Network Indicators:

  • Unusual outbound connections from QSAN server
  • Traffic to QuickInstall endpoints with special characters in parameters
  • Multiple rapid requests to QuickInstall API

SIEM Query:

source="QSAN" AND (process="cmd.exe" OR process="/bin/sh" OR command="*;*" OR command="*|*")

🔗 References

📤 Share & Export