CVE-2021-32535

9.8 CRITICAL

📋 TL;DR

This vulnerability involves hard-coded default credentials in QSAN SANOS storage operating system, allowing unauthenticated remote attackers to gain administrator access and execute arbitrary commands. All systems running vulnerable versions are affected. Attackers can completely compromise the storage system remotely.

💻 Affected Systems

Products:
  • QSAN SANOS
Versions: Versions before v2.1.0
Operating Systems: QSAN SANOS storage operating system
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The hard-coded credentials cannot be changed in vulnerable versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with data destruction, ransomware deployment, or data exfiltration from connected storage systems

🟠

Likely Case

Unauthorized administrative access leading to data theft, system configuration changes, or service disruption

🟢

If Mitigated

Limited impact if systems are isolated from untrusted networks and have additional authentication layers

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers on the internet to gain full control
🏢 Internal Only: HIGH - Even internally, any network-accessible system can be compromised without authentication

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of the hard-coded credentials and network access to the management interface

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QSAN SANOS v2.1.0

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-4892-768d9-1.html

Restart Required: Yes

Instructions:

1. Download QSAN SANOS v2.1.0 from QSAN support portal
2. Backup current configuration and data
3. Apply the firmware update through the management interface
4. Reboot the storage system
5. Verify the update completed successfully

🔧 Temporary Workarounds

Network isolation

all

Restrict network access to QSAN management interfaces using firewall rules

VLAN segmentation

all

Place QSAN systems on isolated VLANs with strict access controls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate QSAN systems from untrusted networks
  • Deploy network-based intrusion detection to monitor for authentication attempts using default credentials

🔍 How to Verify

Check if Vulnerable:

Check SANOS version in web interface or CLI. Versions before 2.1.0 are vulnerable.

Check Version:

Check via web interface at System > Information or via SSH if enabled

Verify Fix Applied:

Verify version shows 2.1.0 or later in system information

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts followed by successful login with default credentials
  • Unusual administrative actions from new IP addresses

Network Indicators:

  • Authentication attempts to management interface using known default credentials
  • Unusual outbound connections from storage system

SIEM Query:

source="qsan_logs" AND (event_type="authentication" AND (username="admin" OR username="default"))

🔗 References

📤 Share & Export