Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:1361412562310126700
HistoryApr 29, 2024 - 12:00 a.m.

QNAP QTS Multiple Vulnerabilities (QSA-24-20)

2024-04-2900:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
8
qnap qts
multiple vulnerabilities
code execution
authorization bypass
cve-2023-50361
cve-2023-50362
cve-2023-50363
cve-2023-50364
network
2-step verification
buffer copy
authentication
update

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

20.1%

QNAP QTS is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/o:qnap:qts";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.126700");
  script_version("2024-09-12T07:59:53+0000");
  script_tag(name:"last_modification", value:"2024-09-12 07:59:53 +0000 (Thu, 12 Sep 2024)");
  script_tag(name:"creation_date", value:"2024-04-29 09:20:42 +0000 (Mon, 29 Apr 2024)");
  script_tag(name:"cvss_base", value:"9.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-09-11 13:27:51 +0000 (Wed, 11 Sep 2024)");

  script_cve_id("CVE-2023-50361", "CVE-2023-50362", "CVE-2023-50363", "CVE-2023-50364");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("QNAP QTS Multiple Vulnerabilities (QSA-24-20)");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("General");
  script_dependencies("gb_qnap_nas_http_detect.nasl");
  script_mandatory_keys("qnap/nas/qts/detected");

  script_tag(name:"summary", value:"QNAP QTS is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The following vulnerabilities exist:

  - CVE-2023-50361, CVE-2023-50362: QNAP QTS allows to the buffer copy without checking size of
  input, which could allow authenticated users to execute code via a network.

  - CVE-2023-50363: QNAP QTS allows to the incorrect authorization, which could allow authenticated
  users to bypass 2-step verification via a network.

  - CVE-2023-50364: QNAP QTS allows to the buffer copy without checking size of input
  vulnerability, which could allow authenticated administrators to execute code via a network.");

  script_tag(name:"affected", value:"QNAP QTS version 5.1.x prior to 5.1.6.2722.");

  script_tag(name:"solution", value:"Update to version 5.1.6.2722 build 20240402 or later.");

  script_xref(name:"URL", value:"https://www.qnap.com/en/security-advisory/qsa-24-20");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (!version = get_app_version(cpe: CPE, nofork: TRUE))
  exit(0);

build = get_kb_item("qnap/nas/qts/build");

if (version =~ "^5\.1") {
  if (version_is_less(version: version, test_version: "5.1.6.2722")) {
    report = report_fixed_ver(installed_version: version, installed_build: build,
                              fixed_version: "5.1.6.2722", fixed_build: "20240402");
    security_message(port: 0, data: report);
    exit(0);
  }

  if (version_is_equal(version: version, test_version: "5.1.6.2722") &&
      (!build || version_is_less(version: build, test_version: "20240402"))) {
    report = report_fixed_ver(installed_version: version, installed_build: build,
                              fixed_version: "5.1.6.2722", fixed_build: "20240402");
    security_message(port: 0, data: report);
    exit(0);
  }
}

exit(99);

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

20.1%

Related for OPENVAS:1361412562310126700