A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute code.
We have already fixed the vulnerability in the following versions:
QTS 5.2.1.2930 build 20241025 and later
QuTS hero h5.2.1.2929 build 20241025 and later
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-24-43 |
![]() ![]() |
History
Fri, 22 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 22 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute code. We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later | |
Title | QTS, QuTS hero | |
Weaknesses | CWE-120 CWE-121 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: qnap
Published: 2024-11-22T15:33:03.459Z
Updated: 2024-11-22T17:05:00.638Z
Reserved: 2024-05-31T08:46:24.563Z
Link: CVE-2024-37047

Updated: 2024-11-22T16:56:51.268Z

Status : Received
Published: 2024-11-22T16:15:23.770
Modified: 2024-11-22T16:15:23.770
Link: CVE-2024-37047

No data.