Lucene search

K
cve[email protected]CVE-2023-23355
HistoryMar 29, 2023 - 5:15 a.m.

CVE-2023-23355

2023-03-2905:15:07
CWE-77
CWE-78
web.nvd.nist.gov
49
cve-2023-23355
os command injection
qnap
operating systems
remote code execution
security patch

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.5%

An OS command injection vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows remote authenticated administrators to execute commands via unspecified vectors.
QES is not affected.

We have already fixed the vulnerability in the following versions:
QTS 5.0.1.2346 build 20230322 and later
QTS 4.5.4.2374 build 20230416 and later
QuTS hero h5.0.1.2348 build 20230324 and later
QuTS hero h4.5.4.2374 build 20230417 and later
QuTScloud c5.0.1.2374 and later

Affected configurations

NVD
Node
qnapqvrMatch-
OR
qnapqtsRange<5.0.1.2346
OR
qnapquts_heroRange<h5.0.1.2348
OR
qnapqutscloudMatch-
Node
qnapqvp-41b_firmwareMatch-
AND
qnapqvp-41bMatch-
Node
qnapqvp-63b_firmwareMatch-
AND
qnapqvp-63bMatch-
Node
qnapqvp-85b_firmwareMatch-
AND
qnapqvp-85bMatch-
Node
qnapqvp-21a_firmwareMatch-
AND
qnapqvp-21aMatch-
Node
qnapqvp-41a_firmwareMatch-
AND
qnapqvp-41aMatch-
Node
qnapqvp-63a_firmwareMatch-
AND
qnapqvp-63aMatch-
Node
qnapqvp-85a_firmwareMatch-
AND
qnapqvp-85aMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "QTS",
    "vendor": "QNAP Systems Inc.",
    "versions": [
      {
        "lessThan": "5.0.1.2346 build 20230322",
        "status": "affected",
        "version": "5.0.*",
        "versionType": "custom"
      },
      {
        "lessThan": "4.5.4.2374 build 20230416",
        "status": "affected",
        "version": "4.5.*",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "QuTS hero",
    "vendor": "QNAP Systems Inc.",
    "versions": [
      {
        "lessThan": "h5.0.1.2348 build 20230324",
        "status": "affected",
        "version": "h5.0.*",
        "versionType": "custom"
      },
      {
        "lessThan": "h4.5.4.2374 build 20230417",
        "status": "affected",
        "version": "h4.5.*",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "QuTScloud",
    "vendor": "QNAP Systems Inc.",
    "versions": [
      {
        "lessThan": "c5.0.1.2374",
        "status": "affected",
        "version": "c5.0.1",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "QES",
    "vendor": "QNAP Systems Inc.",
    "versions": [
      {
        "status": "unaffected",
        "version": "2.2.0"
      }
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.5%

Related for CVE-2023-23355