CVE-2024-27129

May 21, 2024, 4:53 p.m.

Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

Products

QNAP QTS

  • 5.1.7.2770 build 20240520 and later

QNAP QuTS hero

  • h5.1.7.2770 build 20240520 and later

Source

security@qnapsecurity.com.tw

Tags

CVE-2024-27129 details

Published : May 21, 2024, 4:15 p.m.
Last Modified : May 21, 2024, 4:53 p.m.

Description

A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network. We have already fixed the vulnerability in the following version: QTS 5.1.7.2770 build 20240520 and later QuTS hero h5.1.7.2770 build 20240520 and later

CVSS Score

1 2 3 4 5 6.4 7 8 9 10

Weakness

Weakness Name Description

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

Base Score

6.4

Exploitability Score

Impact Score

Base Severity

MEDIUM

References

URL Source
https://www.qnap.com/en/security-advisory/qsa-24-23 security@qnapsecurity.com.tw
This website uses the NVD API, but is not approved or certified by it.