9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
61.9%
A buffer copy without checking size of input vulnerability has been reported to affect QNAP operating system. If exploited, the vulnerability possibly allows remote users to execute code via unspecified vectors.
We have already fixed the vulnerability in the following versions:
QTS 4.3.6.2441 build 20230621 and later
QTS 4.3.3.2420 build 20230621 and later
QTS 4.2.6 build 20230621 and later
QTS 4.3.4.2451 build 20230621 and later
CPE | Name | Operator | Version |
---|---|---|---|
qnap:qts | qnap qts | lt | 4.3.3.2420 |
qnap:qts | qnap qts | lt | 4.3.4.245 |
qnap:qts | qnap qts | lt | 4.3.6.2441 |
[
{
"defaultStatus": "unaffected",
"product": "QTS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "4.3.6.2441 build 20230621",
"status": "affected",
"version": "4.3.*",
"versionType": "custom"
},
{
"lessThan": "4.3.3.2420 build 20230621",
"status": "affected",
"version": "4.3.*",
"versionType": "custom"
},
{
"lessThan": "4.2.6 build 20230621",
"status": "affected",
"version": "4.2.*",
"versionType": "custom"
},
{
"lessThan": "4.3.4.2451 build 20230621",
"status": "affected",
"version": "4.3.*",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "4.5.*"
},
{
"status": "unaffected",
"version": "5.*.*"
}
]
}
]
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
61.9%