CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
22.9%
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.2.2533 build 20230926 and later
QuTS hero h5.1.2.2534 build 20230927 and later
QuTScloud c5.1.5.2651 and later
Vendor | Product | Version | CPE |
---|---|---|---|
qnap | qts | 5.1.0.2348 | cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:* |
qnap | qts | 5.1.0.2399 | cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:* |
qnap | qts | 5.1.0.2418 | cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:* |
qnap | qts | 5.1.0.2444 | cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:* |
qnap | qts | 5.1.0.2466 | cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:* |
qnap | qts | 5.1.1.2491 | cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:* |
qnap | qts | 5.1.2.2533 | cpe:2.3:o:qnap:qts:5.1.2.2533:-:*:*:*:*:*:* |
qnap | quts_hero | h5.1.0.2409 | cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:* |
qnap | quts_hero | h5.1.0.2424 | cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:* |
qnap | quts_hero | h5.1.0.2453 | cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
22.9%