Buffer Copy Vulnerability Affects QNAP Operating System Versions
CVE-2024-27128
8.8HIGH
Summary
A vulnerability has been identified in several versions of the QNAP operating system, characterized by a buffer copy operation that fails to enforce size checks for input data. This oversight creates a potential avenue for authenticated users to exploit the vulnerability, enabling them to execute arbitrary code via a network connection. It is crucial for users of QNAP devices to update to QTS version 5.1.7.2770 build 20240520 or later, as well as the QuTS hero version 5.1.7.2770 build 20240520 or later, to mitigate this risk.
Affected Version(s)
QTS 5.1.x < 5.1.7.2770 build 20240520
QuTS hero h5.1.x
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Aliz Hammond of watchTowr