QTS, QuTS hero, QuTScloud
CVE-2023-45037
7.2HIGH
Summary
A vulnerability has been identified in several versions of QNAP operating systems, characterized by a buffer copy process that lacks appropriate input size validation. This flaw may be exploited by authenticated administrators, enabling them to execute arbitrary code via network interactions. The potential for unauthorized access and execution of commands poses a significant security risk, stressing the importance of timely updates to the affected versions.
Affected Version(s)
QTS 5.1.x < 5.1.3.2578 build 20231110
QuTS hero h5.1.x
QuTScloud c5.x.x
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Jiaxu Zhao && Bingwei Peng