QNAP QTS Vulnerability: Authenticated Execution of Arbitrary Code via Network
CVE-2024-27127

8.8HIGH

Key Information:

Vendor
QNAP
Vendor
CVE Published:
21 May 2024

Summary

A double free vulnerability has been identified in multiple versions of QNAP operating systems, allowing authenticated users to exploit this flaw to execute arbitrary code over a network. This vulnerability poses a significant security risk, as it can be leveraged to manipulate system behavior or compromise sensitive data. QNAP has issued a fix in QTS and QuTS hero versions 5.1.7.2770 build 20240520 or later, enhancing the security posture of their users. Immediate upgrades to the patched versions are recommended to mitigate potential risks.

Affected Version(s)

QTS 5.1.x < 5.1.7.2770 build 20240520

QuTS hero h5.1.x

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Aliz Hammond of watchTowr
.