Description
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later QuTScloud c5.1.0.2498 and later
References (1)
Core 1
Core References
Vendor Advisory
https://www.qnap.com/en/security-advisory/qsa-23-37
Scores
CVSS v3
3.8
EPSS
0.0008
EPSS Percentile
23.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-121
CWE-120
CWE-787
Status
published
Products (3)
qnap/qts
4.5.0 - 4.5.4.2467
qnap/quts_hero
h4.5.0 - h4.5.4.2476
qnap/qutscloud
c5.0.1 - c5.1.0.2498
Published
Oct 06, 2023
Tracked Since
Feb 18, 2026