A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory.
We have already fixed the vulnerability in the following versions:
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.2.2.2952 build 20241116 and later
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-24-49 |
History
Fri, 06 Dec 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 06 Dec 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.2.2950 build 20241114 and later QuTS hero h5.2.2.2952 build 20241116 and later | |
Title | QTS, QuTS hero | |
Weaknesses | CWE-134 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: qnap
Published: 2024-12-06T16:36:45.927Z
Updated: 2024-12-06T19:25:57.274Z
Reserved: 2024-10-24T03:45:32.283Z
Link: CVE-2024-50403
Vulnrichment
Updated: 2024-12-06T19:25:52.396Z
NVD
Status : Received
Published: 2024-12-06T17:15:09.900
Modified: 2024-12-06T17:15:09.900
Link: CVE-2024-50403
Redhat
No data.