CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.3.2578 build 20231110 and later
QTS 4.5.4.2627 build 20231225 and later
QuTS hero h5.1.3.2578 build 20231110 and later
QuTS hero h4.5.4.2626 build 20231225 and later
QuTScloud c5.1.5.2651 and later
[
{
"cpes": [
"cpe:2.3:o:qnap:qts:-:*:*:*:*:*:*:*"
],
"vendor": "qnap",
"product": "qts",
"versions": [
{
"status": "affected",
"version": "-"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:qnap:qts:-:*:*:*:*:*:*:*"
],
"vendor": "qnap",
"product": "qts",
"versions": [
{
"status": "affected",
"version": "-"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:a:qnap:quts_hero:-:*:*:*:*:*:*:*"
],
"vendor": "qnap",
"product": "quts_hero",
"versions": [
{
"status": "affected",
"version": "-"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:a:qnap:quts_hero:-:*:*:*:*:*:*:*"
],
"vendor": "qnap",
"product": "quts_hero",
"versions": [
{
"status": "affected",
"version": "-"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:qnap:qutscloud:-:*:*:*:*:*:*:*"
],
"vendor": "qnap",
"product": "qutscloud",
"versions": [
{
"status": "affected",
"version": "-"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
SSVC
Exploitation
none
Automatable
no
Technical Impact
total