QNAP QTS Multiple Vulnerabilities. Update to version 5.1.4.2596 build 20231128 or later
Reporter | Title | Published | Views | Family All 41 |
---|---|---|---|---|
![]() | QNAP QuTS hero Multiple Vulnerabilities (QSA-23-46, QSA-23-53) | 5 Feb 202400:00 | – | openvas |
![]() | QNAP QuTScloud c5.x < c5.1.5.2651 Multiple Vulnerabilities | 5 Feb 202400:00 | – | openvas |
![]() | QNAP QTS / QuTS hero Multiple Vulnerabilities in QTS, QuTS hero (QSA-23-46) | 15 Feb 202400:00 | – | nessus |
![]() | QNAP QTS / QuTS hero Multiple Vulnerabilities in QTS, QuTS hero and QuTScloud (QSA-23-53) | 12 Feb 202400:00 | – | nessus |
![]() | Qnap QTS Classic Buffer Overflow (CVE-2023-45035) | 16 Oct 202400:00 | – | nessus |
![]() | Qnap QTS Classic Buffer Overflow (CVE-2023-41292) | 16 Oct 202400:00 | – | nessus |
![]() | Qnap QTS Classic Buffer Overflow (CVE-2023-45036) | 16 Oct 202400:00 | – | nessus |
![]() | Qnap QTS OS Command Injection (CVE-2023-41283) | 16 Oct 202400:00 | – | nessus |
![]() | Qnap QTS OS Command Injection (CVE-2023-41282) | 16 Oct 202400:00 | – | nessus |
![]() | Qnap QTS OS Command Injection (CVE-2023-41281) | 16 Oct 202400:00 | – | nessus |
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/o:qnap:qts";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.151639");
script_version("2024-02-07T05:05:18+0000");
script_tag(name:"last_modification", value:"2024-02-07 05:05:18 +0000 (Wed, 07 Feb 2024)");
script_tag(name:"creation_date", value:"2024-02-05 04:28:06 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"8.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:M/C:C/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2024-02-06 20:18:34 +0000 (Tue, 06 Feb 2024)");
script_cve_id("CVE-2023-41281", "CVE-2023-41282", "CVE-2023-41283", "CVE-2023-41292",
"CVE-2023-45035", "CVE-2023-45036", "CVE-2023-45037");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"VendorFix");
script_name("QNAP QTS Multiple Vulnerabilities (QSA-23-46, QSA-23-53)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2024 Greenbone AG");
script_family("General");
script_dependencies("gb_qnap_nas_http_detect.nasl");
script_mandatory_keys("qnap/nas/qts/detected");
script_tag(name:"summary", value:"QNAP QTS is prone to multiple vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The following vulnerabilities exist:
- CVE-2023-41292, CVE-2023-45035, CVE-2023-45036, CVE-2023-45037: Multiple buffer copy without
checking size of input vulnerabilities have been reported to affect certain QNAP operating system
versions. If exploited, these vulnerabilities could allow authenticated administrators to execute
code via a network.
- CVE-2023-41281, CVE-2023-41282, CVE-2023-41283: Multiple OS command injections have been
reported to affect certain QNAP operating system versions. If exploited, these vulnerabilities
could allow authenticated administrators to execute commands via a network.");
script_tag(name:"affected", value:"QNAP QTS version 5.1.x.");
script_tag(name:"solution", value:"Update to version 5.1.4.2596 build 20231128 or later.");
script_xref(name:"URL", value:"https://www.qnap.com/en/security-advisory/qsa-23-46");
script_xref(name:"URL", value:"https://www.qnap.com/en/security-advisory/qsa-23-53");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (!version = get_app_version(cpe: CPE, nofork: TRUE))
exit(0);
build = get_kb_item("qnap/nas/qts/build");
if (version =~ "^5\.1") {
if (version_is_less(version: version, test_version:"5.1.4.2596")) {
report = report_fixed_ver(installed_version: version, installed_build: build,
fixed_version: "5.1.4.2596", fixed_build: "20231128");
security_message(port: 0, data: report);
exit(0);
}
if (version_is_equal(version: version, test_version: "5.1.4.2596") &&
(!build || version_is_less(version: build, test_version: "20231128"))) {
report = report_fixed_ver(installed_version: version, installed_build: build,
fixed_version: "5.1.4.2596", fixed_build: "20231128");
security_message(port: 0, data: report);
exit(0);
}
}
exit(99);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo