CVE-2021-32514

7.5 HIGH

📋 TL;DR

An improper access control vulnerability in the FirmwareUpgrade component of QSAN Storage Manager allows remote attackers to reboot and disrupt storage devices. This affects organizations using vulnerable versions of QSAN Storage Manager for storage management. Attackers can cause denial of service by forcing device reboots.

💻 Affected Systems

Products:
  • QSAN Storage Manager
Versions: Versions before v3.3.3
Operating Systems: Not OS-specific - affects QSAN Storage Manager software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of QSAN Storage Manager with FirmwareUpgrade functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent device disruption leading to extended storage unavailability, data corruption, and business continuity impact.

🟠

Likely Case

Temporary denial of service through forced reboots, disrupting storage operations and dependent applications.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure.

🌐 Internet-Facing: HIGH - Remote attackers can exploit without authentication if exposed to internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit if network access exists.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability allows unauthenticated remote access to reboot functionality. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.3.3

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-4870-83620-1.html

Restart Required: Yes

Instructions:

1. Download QSAN Storage Manager v3.3.3 from official QSAN sources. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart the Storage Manager service. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to QSAN Storage Manager management interface

Use firewall rules to limit access to trusted IPs only

Disable Unnecessary Services

all

Disable FirmwareUpgrade service if not required

Consult QSAN documentation for service disable procedures

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted management networks only
  • Monitor for unauthorized reboot attempts and implement alerting for storage device state changes

🔍 How to Verify

Check if Vulnerable:

Check QSAN Storage Manager version via web interface or CLI. Versions before 3.3.3 are vulnerable.

Check Version:

Check via QSAN Storage Manager web interface or consult vendor documentation for CLI version check

Verify Fix Applied:

Confirm version is 3.3.3 or later and test that unauthorized reboot attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to FirmwareUpgrade endpoints
  • Unexpected storage device reboots
  • Failed authentication attempts to management interface

Network Indicators:

  • Unusual traffic to QSAN Storage Manager management ports from untrusted sources
  • HTTP requests to FirmwareUpgrade endpoints without authentication

SIEM Query:

source="qsan-storage-manager" AND (event="reboot" OR event="firmware_upgrade") AND user="anonymous"

🔗 References

📤 Share & Export