Show plain JSON{"dataType": "CVE_RECORD", "containers": {"adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2024-53691", "role": "CISA Coordinator", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2024-12-06T19:30:45.702069Z"}}}], "affected": [{"cpes": ["cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*"], "vendor": "qnap", "product": "qts", "versions": [{"status": "affected", "version": "5.1.x", "lessThan": "5.1.8.2823 build 20240712", "versionType": "custom"}, {"status": "affected", "version": "5.2.x", "lessThan": "5.2.0.2802 build 20240620", "versionType": "custom"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*"], "vendor": "qnap", "product": "quts_hero", "versions": [{"status": "affected", "version": "h5.1.x", "lessThan": "h5.1.8.2823 build 20240712", "versionType": "custom"}, {"status": "affected", "version": "h5.2.x", "lessThan": "h5.2.0.2802 build 20240620", "versionType": "custom"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-12-06T20:20:54.988Z"}}], "cna": {"title": "QTS, QuTS hero", "source": {"advisory": "QSA-24-28", "discovery": "EXTERNAL"}, "credits": [{"lang": "en", "type": "finder", "value": "c411e"}], "impacts": [{"capecId": "CAPEC-132", "descriptions": [{"lang": "en", "value": "CAPEC-132"}]}], "metrics": [{"format": "CVSS", "cvssV4_0": {"Safety": "NOT_DEFINED", "version": "4.0", "Recovery": "NOT_DEFINED", "baseScore": 8.7, "Automatable": "NOT_DEFINED", "attackVector": "NETWORK", "baseSeverity": "HIGH", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "providerUrgency": "NOT_DEFINED", "userInteraction": "NONE", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "subIntegrityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "subAvailabilityImpact": "NONE", "vulnAvailabilityImpact": "HIGH", "subConfidentialityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED"}, "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "affected": [{"vendor": "QNAP Systems Inc.", "product": "QTS", "versions": [{"status": "affected", "version": "5.1.x", "lessThan": "5.1.8.2823 build 20240712", "versionType": "custom"}, {"status": "affected", "version": "5.2.x", "lessThan": "5.2.0.2802 build 20240620", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"vendor": "QNAP Systems Inc.", "product": "QuTS hero", "versions": [{"status": "affected", "version": "h5.1.x", "lessThan": "h5.1.8.2823 build 20240712", "versionType": "custom"}, {"status": "affected", "version": "h5.2.x", "lessThan": "h5.2.0.2802 build 20240620", "versionType": "custom"}], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.1.8.2823 build 20240712 and later\nQTS 5.2.0.2802 build 20240620 and later\nQuTS hero h5.1.8.2823 build 20240712 and later\nQuTS hero h5.2.0.2802 build 20240620 and later", "supportingMedia": [{"type": "text/html", "value": "We have already fixed the vulnerability in the following versions:<br>QTS 5.1.8.2823 build 20240712 and later<br>QTS 5.2.0.2802 build 20240620 and later<br>QuTS hero h5.1.8.2823 build 20240712 and later<br>QuTS hero h5.2.0.2802 build 20240620 and later<br>", "base64": false}]}], "references": [{"url": "https://www.qnap.com/en/security-advisory/qsa-24-28"}], "x_generator": {"engine": "Vulnogram 0.1.0-dev"}, "descriptions": [{"lang": "en", "value": "A link following vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.8.2823 build 20240712 and later\nQTS 5.2.0.2802 build 20240620 and later\nQuTS hero h5.1.8.2823 build 20240712 and later\nQuTS hero h5.2.0.2802 build 20240620 and later", "supportingMedia": [{"type": "text/html", "value": "A link following vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.<br><br>We have already fixed the vulnerability in the following versions:<br>QTS 5.1.8.2823 build 20240712 and later<br>QTS 5.2.0.2802 build 20240620 and later<br>QuTS hero h5.1.8.2823 build 20240712 and later<br>QuTS hero h5.2.0.2802 build 20240620 and later<br>", "base64": false}]}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "CWE", "cweId": "CWE-59", "description": "CWE-59"}]}], "providerMetadata": {"orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap", "dateUpdated": "2024-12-06T16:34:54.018Z"}}}, "cveMetadata": {"cveId": "CVE-2024-53691", "state": "PUBLISHED", "dateUpdated": "2025-01-24T04:55:42.067Z", "dateReserved": "2024-11-22T06:21:49.206Z", "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "datePublished": "2024-12-06T16:34:54.018Z", "assignerShortName": "qnap"}, "dataVersion": "5.1"}