Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2024-3634
Vulnerability from csaf_certbund
Published
2024-12-08 23:00
Modified
2024-12-08 23:00
Summary
QNAP NAS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
QNAP ist ein Hersteller von NAS (Network Attached Storage) Lösungen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in QNAP NAS ausnutzen, um seine Privilegien zu erhöhen, die Systemsicherheit zu gefährden, beliebige Befehle auszuführen oder Anwendungsdaten zu verändern.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "QNAP ist ein Hersteller von NAS (Network Attached Storage) L\u00f6sungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in QNAP NAS ausnutzen, um seine Privilegien zu erh\u00f6hen, die Systemsicherheit zu gef\u00e4hrden, beliebige Befehle auszuf\u00fchren oder Anwendungsdaten zu ver\u00e4ndern.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3634 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3634.json" }, { "category": "self", "summary": "WID-SEC-2024-3634 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3634" }, { "category": "external", "summary": "QNAP Security Advisory vom 2024-12-08", "url": "https://www.qnap.com/de-de/security-advisory/QSA-24-49" } ], "source_lang": "en-US", "title": "QNAP NAS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-08T23:00:00.000+00:00", "generator": { "date": "2024-12-09T09:46:04.400+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3634", "initial_release_date": "2024-12-08T23:00:00.000+00:00", "revision_history": [ { "date": "2024-12-08T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "QTS \u003c5.1.9.2954 build 20241120", "product": { "name": "QNAP NAS QTS \u003c5.1.9.2954 build 20241120", "product_id": "T039637" } }, { "category": "product_version", "name": "QTS 5.1.9.2954 build 20241120", "product": { "name": "QNAP NAS QTS 5.1.9.2954 build 20241120", "product_id": "T039637-fixed", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:qts__5.1.9.2954_build_20241120" } } }, { "category": "product_version_range", "name": "QTS \u003c5.2.2.2950 build 20241114", "product": { "name": "QNAP NAS QTS \u003c5.2.2.2950 build 20241114", "product_id": "T039638" } }, { "category": "product_version", "name": "QTS 5.2.2.2950 build 20241114", "product": { "name": "QNAP NAS QTS 5.2.2.2950 build 20241114", "product_id": "T039638-fixed", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:qts__5.2.2.2950_build_20241114" } } }, { "category": "product_version_range", "name": "QuTS hero \u003ch5.1.9.2954 build 20241120", "product": { "name": "QNAP NAS QuTS hero \u003ch5.1.9.2954 build 20241120", "product_id": "T039639" } }, { "category": "product_version", "name": "QuTS hero h5.1.9.2954 build 20241120", "product": { "name": "QNAP NAS QuTS hero h5.1.9.2954 build 20241120", "product_id": "T039639-fixed", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:quts_hero__h5.1.9.2954_build_20241120" } } }, { "category": "product_version_range", "name": "QuTS hero \u003ch5.2.2.2952 build 20241116", "product": { "name": "QNAP NAS QuTS hero \u003ch5.2.2.2952 build 20241116", "product_id": "T039640" } }, { "category": "product_version", "name": "QuTS hero h5.2.2.2952 build 20241116", "product": { "name": "QNAP NAS QuTS hero h5.2.2.2952 build 20241116", "product_id": "T039640-fixed", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:quts_hero__h5.2.2.2952_build_20241116" } } } ], "category": "product_name", "name": "NAS" } ], "category": "vendor", "name": "QNAP" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-48859", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in QNAP NAS. Diese Fehler existieren wegen verschiedener Sicherheitsl\u00fccken in unterschiedlichen Komponenten, die unautorisierte Aktionen erm\u00f6glichen. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, die Systemsicherheit zu gef\u00e4hrden, beliebige Befehle auszuf\u00fchren oder Anwendungsdaten zu ver\u00e4ndern. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039638", "T039637", "T039639", "T039640" ] }, "release_date": "2024-12-08T23:00:00.000+00:00", "title": "CVE-2024-48859" }, { "cve": "CVE-2024-48865", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in QNAP NAS. Diese Fehler existieren wegen verschiedener Sicherheitsl\u00fccken in unterschiedlichen Komponenten, die unautorisierte Aktionen erm\u00f6glichen. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, die Systemsicherheit zu gef\u00e4hrden, beliebige Befehle auszuf\u00fchren oder Anwendungsdaten zu ver\u00e4ndern. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039638", "T039637", "T039639", "T039640" ] }, "release_date": "2024-12-08T23:00:00.000+00:00", "title": "CVE-2024-48865" }, { "cve": "CVE-2024-48866", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in QNAP NAS. Diese Fehler existieren wegen verschiedener Sicherheitsl\u00fccken in unterschiedlichen Komponenten, die unautorisierte Aktionen erm\u00f6glichen. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, die Systemsicherheit zu gef\u00e4hrden, beliebige Befehle auszuf\u00fchren oder Anwendungsdaten zu ver\u00e4ndern. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039638", "T039637", "T039639", "T039640" ] }, "release_date": "2024-12-08T23:00:00.000+00:00", "title": "CVE-2024-48866" }, { "cve": "CVE-2024-48867", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in QNAP NAS. Diese Fehler existieren wegen verschiedener Sicherheitsl\u00fccken in unterschiedlichen Komponenten, die unautorisierte Aktionen erm\u00f6glichen. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, die Systemsicherheit zu gef\u00e4hrden, beliebige Befehle auszuf\u00fchren oder Anwendungsdaten zu ver\u00e4ndern. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039638", "T039637", "T039639", "T039640" ] }, "release_date": "2024-12-08T23:00:00.000+00:00", "title": "CVE-2024-48867" }, { "cve": "CVE-2024-48868", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in QNAP NAS. Diese Fehler existieren wegen verschiedener Sicherheitsl\u00fccken in unterschiedlichen Komponenten, die unautorisierte Aktionen erm\u00f6glichen. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, die Systemsicherheit zu gef\u00e4hrden, beliebige Befehle auszuf\u00fchren oder Anwendungsdaten zu ver\u00e4ndern. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039638", "T039637", "T039639", "T039640" ] }, "release_date": "2024-12-08T23:00:00.000+00:00", "title": "CVE-2024-48868" }, { "cve": "CVE-2024-50393", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in QNAP NAS. Diese Fehler existieren wegen verschiedener Sicherheitsl\u00fccken in unterschiedlichen Komponenten, die unautorisierte Aktionen erm\u00f6glichen. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, die Systemsicherheit zu gef\u00e4hrden, beliebige Befehle auszuf\u00fchren oder Anwendungsdaten zu ver\u00e4ndern. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039638", "T039637", "T039639", "T039640" ] }, "release_date": "2024-12-08T23:00:00.000+00:00", "title": "CVE-2024-50393" }, { "cve": "CVE-2024-50402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in QNAP NAS. Diese Fehler existieren wegen verschiedener Sicherheitsl\u00fccken in unterschiedlichen Komponenten, die unautorisierte Aktionen erm\u00f6glichen. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, die Systemsicherheit zu gef\u00e4hrden, beliebige Befehle auszuf\u00fchren oder Anwendungsdaten zu ver\u00e4ndern. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039638", "T039637", "T039639", "T039640" ] }, "release_date": "2024-12-08T23:00:00.000+00:00", "title": "CVE-2024-50402" }, { "cve": "CVE-2024-50403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in QNAP NAS. Diese Fehler existieren wegen verschiedener Sicherheitsl\u00fccken in unterschiedlichen Komponenten, die unautorisierte Aktionen erm\u00f6glichen. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, die Systemsicherheit zu gef\u00e4hrden, beliebige Befehle auszuf\u00fchren oder Anwendungsdaten zu ver\u00e4ndern. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039638", "T039637", "T039639", "T039640" ] }, "release_date": "2024-12-08T23:00:00.000+00:00", "title": "CVE-2024-50403" } ] }
CVE-2024-48866 (GCVE-0-2024-48866)
Vulnerability from cvelistv5
Published
2024-12-06 16:36
Modified
2024-12-06 19:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An improper handling of URL encoding (Hex Encoding) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to run the system into unexpected state.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | QNAP Systems Inc. | QTS |
Version: 5.1.x < 5.1.9.2954 build 20241120 Version: 5.2.x < 5.2.2.2950 build 20241114 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-48866", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-06T19:27:30.134737Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-06T19:29:20.387Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "QuTS hero", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Pwn2Own 2024 - Chris Anastasio \u0026 Fabius Watson" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An improper handling of URL encoding (Hex Encoding) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to run the system into unexpected state.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "An improper handling of URL encoding (Hex Encoding) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to run the system into unexpected state.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "impacts": [ { "capecId": "CAPEC-72", "descriptions": [ { "lang": "en", "value": "CAPEC-72" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 2.3, "baseSeverity": "LOW", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-177", "description": "CWE-177", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T16:36:13.985Z", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-49" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "source": { "advisory": "QSA-24-49", "discovery": "EXTERNAL" }, "title": "QTS, QuTS hero", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2024-48866", "datePublished": "2024-12-06T16:36:13.985Z", "dateReserved": "2024-10-09T00:22:57.834Z", "dateUpdated": "2024-12-06T19:29:20.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-48868 (GCVE-0-2024-48868)
Vulnerability from cvelistv5
Published
2024-12-06 16:36
Modified
2024-12-06 19:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An improper neutralization of CRLF sequences ('CRLF Injection') vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to modify application data.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | QNAP Systems Inc. | QTS |
Version: 5.1.x < 5.1.9.2954 build 20241120 Version: 5.2.x < 5.2.2.2950 build 20241114 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "qts", "vendor": "qnap", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quts_hero", "vendor": "qnap", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-48868", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-06T19:26:55.261983Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-06T19:36:12.495Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "QuTS hero", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Pwn2Own 2024 - Chris Anastasio \u0026 Fabius Watson" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An improper neutralization of CRLF sequences (\u0027CRLF Injection\u0027) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to modify application data.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "An improper neutralization of CRLF sequences (\u0027CRLF Injection\u0027) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to modify application data.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "impacts": [ { "capecId": "CAPEC-15", "descriptions": [ { "lang": "en", "value": "CAPEC-15" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-93", "description": "CWE-93", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T16:36:27.206Z", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-49" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "source": { "advisory": "QSA-24-49", "discovery": "EXTERNAL" }, "title": "QTS, QuTS hero", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2024-48868", "datePublished": "2024-12-06T16:36:27.206Z", "dateReserved": "2024-10-09T00:22:57.834Z", "dateUpdated": "2024-12-06T19:36:12.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-48865 (GCVE-0-2024-48865)
Vulnerability from cvelistv5
Published
2024-12-06 16:36
Modified
2024-12-06 19:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An improper certificate validation vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow attackers with local network access to compromise the security of the system.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | QNAP Systems Inc. | QTS |
Version: 5.1.x < 5.1.9.2954 build 20241120 Version: 5.2.x < 5.2.2.2950 build 20241114 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "qts", "vendor": "qnap", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quts_hero", "vendor": "qnap", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-48865", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-06T19:27:45.106148Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-06T19:38:27.732Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "QuTS hero", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Pwn2Own 2024 - ExLuck of ANHTUD" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An improper certificate validation vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow attackers with local network access to compromise the security of the system.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "An improper certificate validation vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow attackers with local network access to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "impacts": [ { "capecId": "CAPEC-475", "descriptions": [ { "lang": "en", "value": "CAPEC-475" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "PHYSICAL", "baseScore": 7.3, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T16:36:05.597Z", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-49" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "source": { "advisory": "QSA-24-49", "discovery": "EXTERNAL" }, "title": "QTS, QuTS hero", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2024-48865", "datePublished": "2024-12-06T16:36:05.597Z", "dateReserved": "2024-10-09T00:22:57.834Z", "dateUpdated": "2024-12-06T19:38:27.732Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-48867 (GCVE-0-2024-48867)
Vulnerability from cvelistv5
Published
2024-12-06 16:36
Modified
2024-12-06 19:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An improper neutralization of CRLF sequences ('CRLF Injection') vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to modify application data.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | QNAP Systems Inc. | QTS |
Version: 5.1.x < 5.1.9.2954 build 20241120 Version: 5.2.x < 5.2.2.2950 build 20241114 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "qts", "vendor": "qnap", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quts_hero", "vendor": "qnap", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-48867", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-06T19:27:08.830441Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-06T19:38:19.849Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "QuTS hero", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Pwn2Own 2024 - Chris Anastasio \u0026 Fabius Watson" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An improper neutralization of CRLF sequences (\u0027CRLF Injection\u0027) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to modify application data.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "An improper neutralization of CRLF sequences (\u0027CRLF Injection\u0027) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to modify application data.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "impacts": [ { "capecId": "CAPEC-15", "descriptions": [ { "lang": "en", "value": "CAPEC-15" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-93", "description": "CWE-93", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T16:36:20.438Z", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-49" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "source": { "advisory": "QSA-24-49", "discovery": "EXTERNAL" }, "title": "QTS, QuTS hero", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2024-48867", "datePublished": "2024-12-06T16:36:20.438Z", "dateReserved": "2024-10-09T00:22:57.834Z", "dateUpdated": "2024-12-06T19:38:19.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-50402 (GCVE-0-2024-50402)
Vulnerability from cvelistv5
Published
2024-12-06 16:36
Modified
2024-12-06 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | QNAP Systems Inc. | QTS |
Version: 5.1.x < 5.1.9.2954 build 20241120 Version: 5.2.x < 5.2.2.2950 build 20241114 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-50402", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-06T19:26:09.538630Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-06T19:26:18.132Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "QuTS hero", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Anh Nguyen Le Quoc (h4niz), Tri, Nguyen Huu (trinh), Quy, Cao Ngoc (quycn) of bl4ckh0l3 from Galaxy One" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "impacts": [ { "capecId": "CAPEC-135", "descriptions": [ { "lang": "en", "value": "CAPEC-135" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 2.1, "baseSeverity": "LOW", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T16:36:39.547Z", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-49" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "source": { "advisory": "QSA-24-49", "discovery": "EXTERNAL" }, "title": "QTS, QuTS hero", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2024-50402", "datePublished": "2024-12-06T16:36:39.547Z", "dateReserved": "2024-10-24T03:45:32.283Z", "dateUpdated": "2024-12-06T19:26:18.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-48859 (GCVE-0-2024-48859)
Vulnerability from cvelistv5
Published
2024-12-06 16:35
Modified
2024-12-06 19:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to compromise the security of the system.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | QNAP Systems Inc. | QTS |
Version: 5.1.x < 5.1.9.2954 build 20241120 Version: 5.2.x < 5.2.2.2950 build 20241114 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "qts", "vendor": "qnap", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quts_hero", "vendor": "qnap", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-48859", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-06T19:28:05.474899Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-06T19:38:38.778Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "QuTS hero", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Pwn2Own 2024 - Corentin BAYET of Reverse_Tactics" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to compromise the security of the system.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T16:35:58.818Z", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-49" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "source": { "advisory": "QSA-24-49", "discovery": "EXTERNAL" }, "title": "QTS, QuTS hero", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2024-48859", "datePublished": "2024-12-06T16:35:58.818Z", "dateReserved": "2024-10-09T00:22:57.833Z", "dateUpdated": "2024-12-06T19:38:38.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-50393 (GCVE-0-2024-50393)
Vulnerability from cvelistv5
Published
2024-12-06 16:36
Modified
2024-12-10 04:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | QNAP Systems Inc. | QTS |
Version: 5.1.x < 5.1.9.2954 build 20241120 Version: 5.2.x < 5.2.2.2950 build 20241114 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "qts", "vendor": "qnap", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" }, { "status": "affected", "version": "5.0.x" }, { "status": "affected", "version": "4.5.x" } ] }, { "cpes": [ "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quts_hero", "vendor": "qnap", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-50393", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-09T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-10T04:55:54.258Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "5.1.9.2954 build 20241120", "status": "affected", "version": "5.1.x", "versionType": "custom" }, { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" }, { "status": "unaffected", "version": "5.0.x" }, { "status": "unaffected", "version": "4.5.x" } ] }, { "defaultStatus": "unaffected", "product": "QuTS hero", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "h5.1.9.2954 build 20241120", "status": "affected", "version": "h5.1.x", "versionType": "custom" }, { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Pwn2Own 2024 - Corentin BAYET of Reverse_Tactics" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T16:36:33.342Z", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-49" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.1.9.2954 build 20241120 and later\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.1.9.2954 build 20241120 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "source": { "advisory": "QSA-24-49", "discovery": "EXTERNAL" }, "title": "QTS, QuTS hero", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2024-50393", "datePublished": "2024-12-06T16:36:33.342Z", "dateReserved": "2024-10-24T03:41:08.489Z", "dateUpdated": "2024-12-10T04:55:54.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-50403 (GCVE-0-2024-50403)
Vulnerability from cvelistv5
Published
2024-12-06 16:36
Modified
2024-12-06 19:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory.
We have already fixed the vulnerability in the following versions:
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.2.2.2952 build 20241116 and later
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | QNAP Systems Inc. | QTS |
Version: 5.2.x < 5.2.2.2950 build 20241114 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-50403", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-06T19:25:04.374566Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-06T19:25:57.274Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "5.2.2.2950 build 20241114", "status": "affected", "version": "5.2.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "QuTS hero", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "h5.2.2.2952 build 20241116", "status": "affected", "version": "h5.2.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Anh Nguyen Le Quoc (h4niz), Tri, Nguyen Huu (trinh), Quy, Cao Ngoc (quycn) of bl4ckh0l3 from Galaxy One" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "impacts": [ { "capecId": "CAPEC-135", "descriptions": [ { "lang": "en", "value": "CAPEC-135" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 2.1, "baseSeverity": "LOW", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T16:36:45.927Z", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-49" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.2.2.2950 build 20241114 and later\u003cbr\u003eQuTS hero h5.2.2.2952 build 20241116 and later\u003cbr\u003e" } ], "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.2.2.2950 build 20241114 and later\nQuTS hero h5.2.2.2952 build 20241116 and later" } ], "source": { "advisory": "QSA-24-49", "discovery": "EXTERNAL" }, "title": "QTS, QuTS hero", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2024-50403", "datePublished": "2024-12-06T16:36:45.927Z", "dateReserved": "2024-10-24T03:45:32.283Z", "dateUpdated": "2024-12-06T19:25:57.274Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…