A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later
History

Fri, 22 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 15:45:00 +0000

Type Values Removed Values Added
Description A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later
Title QTS, QuTS hero
Weaknesses CWE-134
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: qnap

Published: 2024-11-22T15:31:41.184Z

Updated: 2024-11-22T16:44:57.056Z

Reserved: 2024-10-24T03:41:08.490Z

Link: CVE-2024-50396

cve-icon Vulnrichment

Updated: 2024-11-22T16:43:11.524Z

cve-icon NVD

Status : Received

Published: 2024-11-22T16:15:32.540

Modified: 2024-11-22T16:15:32.540

Link: CVE-2024-50396

cve-icon Redhat

No data.