Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
Products
QTS
- 5.1.8.2823 build 20240712 and later
QuTS hero
- h5.1.8.2823 build 20240712 and later
Source
security@qnapsecurity.com.tw
Tags
CVE-2024-32765 details
Published : Aug. 12, 2024, 1:38 p.m.
Last Modified : Aug. 12, 2024, 1:41 p.m.
Last Modified : Aug. 12, 2024, 1:41 p.m.
Description
A vulnerability has been reported to affect Network & Virtual Switch. If exploited, the vulnerability could allow local authenticated administrators to gain access to and execute certain functions via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 5.1.8.2823 build 20240712 and later QuTS hero h5.1.8.2823 build 20240712 and later
CVSS Score
1 | 2 | 3 | 4.2 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-291 | Reliance on IP Address for Authentication | The product uses an IP address for authentication. |
CVSS Data
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
Base Score
4.2
Exploitability Score
0.8
Impact Score
3.4
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
References
URL | Source |
---|---|
https://www.qnap.com/en/security-advisory/qsa-24-14 | security@qnapsecurity.com.tw |
This website uses the NVD API, but is not approved or certified by it.