Lucene search

K
cve[email protected]CVE-2023-23367
HistoryNov 10, 2023 - 3:15 p.m.

CVE-2023-23367

2023-11-1015:15:08
CWE-78
web.nvd.nist.gov
19
cve-2023-23367
os command injection
qnap
vulnerability
network commands
nvd
security fixed.

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.4%

An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.

We have already fixed the vulnerability in the following versions:
QTS 5.0.1.2376 build 20230421 and later
QuTS hero h5.0.1.2376 build 20230421 and later
QuTScloud c5.1.0.2498 and later

Affected configurations

NVD
Node
qnapqtsMatch5.0.0.1716build_20210701
OR
qnapqtsMatch5.0.0.1785build_20210908
OR
qnapqtsMatch5.0.0.1808build_20211001
OR
qnapqtsMatch5.0.0.1828build_20211020
OR
qnapqtsMatch5.0.0.1837build_20211029
OR
qnapqtsMatch5.0.0.1850build_20211111
OR
qnapqtsMatch5.0.0.1853build_20211114
OR
qnapqtsMatch5.0.0.1858build_20211119
OR
qnapqtsMatch5.0.0.1870build_20211201
OR
qnapqtsMatch5.0.1.2034build_20220515
OR
qnapqtsMatch5.0.1.2079build_20220629
OR
qnapqtsMatch5.0.1.2131build_20220820
OR
qnapqtsMatch5.0.1.2137build_20220826
OR
qnapqtsMatch5.0.1.2145build_20220903
OR
qnapqtsMatch5.0.1.2173build_20221001
OR
qnapqtsMatch5.0.1.2194build_20221022
OR
qnapqtsMatch5.0.1.2234build_20221201
OR
qnapqtsMatch5.0.1.2248build_20221215
OR
qnapqtsMatch5.0.1.2277build_20230112
OR
qnapqtsMatch5.0.1.2346build_20230322
Node
qnapquts_heroMatchh5.0.0.1772build_20210826
OR
qnapquts_heroMatchh5.0.0.1844build_20211105
OR
qnapquts_heroMatchh5.0.0.1856build_20211117
OR
qnapquts_heroMatchh5.0.0.1892build_20211222
OR
qnapquts_heroMatchh5.0.0.1900build_20211228
OR
qnapquts_heroMatchh5.0.0.1949build_20220215
OR
qnapquts_heroMatchh5.0.0.1986build_20220324
OR
qnapquts_heroMatchh5.0.0.2022build_20220428
OR
qnapquts_heroMatchh5.0.0.2069build_20220614
OR
qnapquts_heroMatchh5.0.0.2120build_20220804
OR
qnapquts_heroMatchh5.0.1.2045build_20220526
OR
qnapquts_heroMatchh5.0.1.2192build_20221020
OR
qnapquts_heroMatchh5.0.1.2248build_20221215
OR
qnapquts_heroMatchh5.0.1.2269build_20230104
OR
qnapquts_heroMatchh5.0.1.2277build_20230112
OR
qnapquts_heroMatchh5.0.1.2348build_20230324
Node
qnapqutscloudMatchc5.0.0.1919build_20220119
OR
qnapqutscloudMatchc5.0.1.1949build_20220218
OR
qnapqutscloudMatchc5.0.1.1998build_20220408
OR
qnapqutscloudMatchc5.0.1.2044build_20220524
OR
qnapqutscloudMatchc5.0.1.2148build_20220905
OR
qnapqutscloudMatchc5.0.1.2374build_20230419

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "QTS",
    "vendor": "QNAP Systems Inc.",
    "versions": [
      {
        "lessThan": "5.0.1.2376 build 20230421",
        "status": "affected",
        "version": "5.0.x",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "QuTS hero",
    "vendor": "QNAP Systems Inc.",
    "versions": [
      {
        "lessThan": "h5.0.1.2376 build 20230421",
        "status": "affected",
        "version": "h5.0.x",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "QuTScloud",
    "vendor": "QNAP Systems Inc.",
    "versions": [
      {
        "lessThan": "c5.1.0.2498",
        "status": "affected",
        "version": "c5.x.x",
        "versionType": "custom"
      }
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.4%

Related for CVE-2023-23367