A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-24-49 |
History
Fri, 06 Dec 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 06 Dec 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QTS 5.2.2.2950 build 20241114 and later QuTS hero h5.1.9.2954 build 20241120 and later QuTS hero h5.2.2.2952 build 20241116 and later | |
Title | QTS, QuTS hero | |
Weaknesses | CWE-134 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: qnap
Published: 2024-12-06T16:36:39.547Z
Updated: 2024-12-06T19:26:18.132Z
Reserved: 2024-10-24T03:45:32.283Z
Link: CVE-2024-50402
Vulnrichment
Updated: 2024-12-06T19:26:14.888Z
NVD
Status : Received
Published: 2024-12-06T17:15:09.757
Modified: 2024-12-06T17:15:09.757
Link: CVE-2024-50402
Redhat
No data.