A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.2.2950 build 20241114 and later QuTS hero h5.2.2.2952 build 20241116 and later
History

Fri, 06 Dec 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Dec 2024 17:00:00 +0000

Type Values Removed Values Added
Description A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.2.2950 build 20241114 and later QuTS hero h5.2.2.2952 build 20241116 and later
Title QTS, QuTS hero
Weaknesses CWE-134
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: qnap

Published: 2024-12-06T16:36:45.927Z

Updated: 2024-12-06T19:25:57.274Z

Reserved: 2024-10-24T03:45:32.283Z

Link: CVE-2024-50403

cve-icon Vulnrichment

Updated: 2024-12-06T19:25:52.396Z

cve-icon NVD

Status : Received

Published: 2024-12-06T17:15:09.900

Modified: 2024-12-06T17:15:09.900

Link: CVE-2024-50403

cve-icon Redhat

No data.