Improper Input Validation Leads to Code Injection in QNAP QTS
CVE-2019-7193
Key Information:
- Vendor
- Qnap
- Status
- Vendor
- CVE Published:
- 5 December 2019
Badges
Summary
This vulnerability in QNAP's QTS software allows remote attackers to perform arbitrary code execution due to improper input validation. Attackers can exploit this flaw to inject malicious commands into the system, potentially leading to unauthorized access and control over the affected device. QNAP has recommended users update to the latest version of QTS to safeguard against this vulnerability and improve overall system security.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited and is known by the CISA as enabling ransomware campaigns.
The CISA's recommendation is: Apply updates per vendor instructions.
Affected Version(s)
QNAP NAS devices QTS 4.4.0 - QTS 4.4.1: before build 20190918, QTS 4.3.6: before build 20190919
References
EPSS Score
89% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 💰
Used in Ransomware
- 👾
Exploit known to exist
- 🦅
CISA Reported
Vulnerability published
Vulnerability Reserved