A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to obtain secret data or modify memory.
We have already fixed the vulnerability in the following versions:
QTS 5.2.1.2930 build 20241025 and later
QuTS hero h5.2.1.2929 build 20241025 and later
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-24-43 |
History
Fri, 22 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 22 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later | |
Title | QTS, QuTS hero | |
Weaknesses | CWE-134 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: qnap
Published: 2024-11-22T15:31:34.360Z
Updated: 2024-11-22T16:44:57.191Z
Reserved: 2024-10-24T03:45:32.282Z
Link: CVE-2024-50397
Vulnrichment
Updated: 2024-11-22T16:43:17.329Z
NVD
Status : Received
Published: 2024-11-22T16:15:32.700
Modified: 2024-11-22T16:15:32.700
Link: CVE-2024-50397
Redhat
No data.