Lucene search

K
cve[email protected]CVE-2023-47567
HistoryFeb 02, 2024 - 4:15 p.m.

CVE-2023-47567

2024-02-0216:15:52
CWE-78
web.nvd.nist.gov
14
qnap
os command injection
vulnerability
qts
quts hero
qutscloud
security patch
nvd
cve-2023-47567

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.4%

An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.

We have already fixed the vulnerability in the following versions:
QTS 5.1.5.2645 build 20240116 and later
QTSΒ 4.5.4.2627 build 20231225 and later
QuTS hero h5.1.5.2647 build 20240118 and later
QuTS heroΒ h4.5.4.2626 build 20231225 and later
QuTScloud c5.1.5.2651 and later

Affected configurations

NVD
Node
qnapqtsMatch4.5.4.1715build_20210630
OR
qnapqtsMatch4.5.4.1723build_20210708
OR
qnapqtsMatch4.5.4.1741build_20210726
OR
qnapqtsMatch4.5.4.1787build_20210910
OR
qnapqtsMatch4.5.4.1800build_20210923
OR
qnapqtsMatch4.5.4.1892build_20211223
OR
qnapqtsMatch4.5.4.1931build_20220128
OR
qnapqtsMatch4.5.4.2012build_20220419
OR
qnapqtsMatch4.5.4.2117build_20220802
OR
qnapqtsMatch4.5.4.2280build_20230112
OR
qnapqtsMatch4.5.4.2374build_20230416
OR
qnapqtsMatch4.5.4.2627-
OR
qnapqtsMatch5.1.0.2348build_20230325
OR
qnapqtsMatch5.1.0.2399build_20230515
OR
qnapqtsMatch5.1.0.2418build_20230603
OR
qnapqtsMatch5.1.0.2444build_20230629
OR
qnapqtsMatch5.1.0.2466build_20230721
OR
qnapqtsMatch5.1.1.2491build_20230815
OR
qnapqtsMatch5.1.2.2533build_20230926
OR
qnapqtsMatch5.1.3.2578build_20231110
OR
qnapqtsMatch5.1.4.2596build_20231128
OR
qnapqtsMatch5.1.5.2645-
OR
qnapquts_heroMatchh4.5.4.1771build_20210825
OR
qnapquts_heroMatchh4.5.4.1800build_20210923
OR
qnapquts_heroMatchh4.5.4.1813build_20211006
OR
qnapquts_heroMatchh4.5.4.1848build_20211109
OR
qnapquts_heroMatchh4.5.4.1892build_20211223
OR
qnapquts_heroMatchh4.5.4.1951build_20220218
OR
qnapquts_heroMatchh4.5.4.1971build_20220310
OR
qnapquts_heroMatchh4.5.4.1991build_20220330
OR
qnapquts_heroMatchh4.5.4.2052build_20220530
OR
qnapquts_heroMatchh4.5.4.2138build_20220824
OR
qnapquts_heroMatchh4.5.4.2217build_20221111
OR
qnapquts_heroMatchh4.5.4.2272build_20230105
OR
qnapquts_heroMatchh4.5.4.2374build_20230417
OR
qnapquts_heroMatchh4.5.4.2476build_20230728
OR
qnapquts_heroMatchh4.5.4.2626-
OR
qnapquts_heroMatchh5.1.0.2409build_20230525
OR
qnapquts_heroMatchh5.1.0.2424build_20230609
OR
qnapquts_heroMatchh5.1.0.2453build_20230708
OR
qnapquts_heroMatchh5.1.0.2466build_20230721
OR
qnapquts_heroMatchh5.1.1.2488build_20230812
OR
qnapquts_heroMatchh5.1.2.2534build_20230927
OR
qnapquts_heroMatchh5.1.3.2578build_20231110
OR
qnapquts_heroMatchh5.1.4.2596build_20231128
OR
qnapquts_heroMatchh5.1.5.2647-
OR
qnapqutscloudMatchc5.1.0.2498build_20230822

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "QTS",
    "vendor": "QNAP Systems Inc.",
    "versions": [
      {
        "lessThan": "5.1.5.2645 build 20240116",
        "status": "affected",
        "version": "5.1.x",
        "versionType": "custom"
      },
      {
        "lessThan": "4.5.4.2627 build 20231225",
        "status": "affected",
        "version": "4.5.x",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "QuTS hero",
    "vendor": "QNAP Systems Inc.",
    "versions": [
      {
        "lessThan": "h5.1.5.2647 build 20240118",
        "status": "affected",
        "version": "h5.1.x",
        "versionType": "custom"
      },
      {
        "lessThan": "h4.5.4.2626 build 20231225",
        "status": "affected",
        "version": "h4.5.x",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "QuTScloud",
    "vendor": "QNAP Systems Inc.",
    "versions": [
      {
        "lessThan": "c5.1.5.2651",
        "status": "affected",
        "version": "c5.x.x",
        "versionType": "custom"
      }
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.4%

Related for CVE-2023-47567