QNAP QTS Vulnerability: Authenticated Execution of Arbitrary Code via Network
CVE-2024-27127
8.8HIGH
Summary
A double free vulnerability has been identified in multiple versions of QNAP operating systems, allowing authenticated users to exploit this flaw to execute arbitrary code over a network. This vulnerability poses a significant security risk, as it can be leveraged to manipulate system behavior or compromise sensitive data. QNAP has issued a fix in QTS and QuTS hero versions 5.1.7.2770 build 20240520 or later, enhancing the security posture of their users. Immediate upgrades to the patched versions are recommended to mitigate potential risks.
Affected Version(s)
QTS 5.1.x < 5.1.7.2770 build 20240520
QuTS hero h5.1.x
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Aliz Hammond of watchTowr