We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-41279

QTS, QuTS hero, QuTScloud



Assignerqnap
Reserved2023-08-28
Published2024-02-02
Updated2024-08-02

Description

A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later



MEDIUM: 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L

Product status

Default status
unaffected

5.1.x before 5.1.2.2533 build 20230926
affected

Default status
unaffected

h5.1.x before h5.1.2.2534 build 20230927
affected

Default status
unaffected

c5.x.x before c5.1.5.2651
affected

Credits

Jiaxu Zhao && Bingwei Peng finder

References

https://www.qnap.com/en/security-advisory/qsa-23-38

cve.org CVE-2023-41279

nvd.nist.gov CVE-2023-41279

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-41279

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.