Improper Input Validation Leads to Code Injection in QNAP QTS
CVE-2019-7193

9.8CRITICAL

Key Information:

Vendor
Qnap
Vendor
CVE Published:
5 December 2019

Badges

💰 Ransomware👾 Exploit Exists🟣 EPSS 89%🦅 CISA Reported

Summary

This vulnerability in QNAP's QTS software allows remote attackers to perform arbitrary code execution due to improper input validation. Attackers can exploit this flaw to inject malicious commands into the system, potentially leading to unauthorized access and control over the affected device. QNAP has recommended users update to the latest version of QTS to safeguard against this vulnerability and improve overall system security.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited and is known by the CISA as enabling ransomware campaigns.

The CISA's recommendation is: Apply updates per vendor instructions.

Affected Version(s)

QNAP NAS devices QTS 4.4.0 - QTS 4.4.1: before build 20190918, QTS 4.3.6: before build 20190919

References

EPSS Score

89% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.