CVE-2024-32765

Aug. 12, 2024, 1:41 p.m.

Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

Products

QTS

  • 5.1.8.2823 build 20240712 and later

QuTS hero

  • h5.1.8.2823 build 20240712 and later

Source

security@qnapsecurity.com.tw

Tags

CVE-2024-32765 details

Published : Aug. 12, 2024, 1:38 p.m.
Last Modified : Aug. 12, 2024, 1:41 p.m.

Description

A vulnerability has been reported to affect Network & Virtual Switch. If exploited, the vulnerability could allow local authenticated administrators to gain access to and execute certain functions via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 5.1.8.2823 build 20240712 and later QuTS hero h5.1.8.2823 build 20240712 and later

CVSS Score

1 2 3 4.2 5 6 7 8 9 10

Weakness

Weakness Name Description
CWE-291 Reliance on IP Address for Authentication The product uses an IP address for authentication.

CVSS Data

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

Base Score

4.2

Exploitability Score

0.8

Impact Score

3.4

Base Severity

MEDIUM

References

URL Source
https://www.qnap.com/en/security-advisory/qsa-24-14 security@qnapsecurity.com.tw
This website uses the NVD API, but is not approved or certified by it.