// For flags

CVE-2023-32972

QTS, QuTS hero, QuTScloud

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.

We have already fixed the vulnerability in the following versions:
QTS 5.0.1.2425 build 20230609 and later
QTS 5.1.0.2444 build 20230629 and later
QTS 4.5.4.2467 build 20230718 and later
QuTS hero h5.0.1.2515 build 20230907 and later
QuTS hero h5.1.0.2424 build 20230609 and later
QuTS hero h4.5.4.2476 build 20230728 and later
QuTScloud c5.1.0.2498 and later

Se ha informado que una copia del búfer sin verificar el tamaño de la vulnerabilidad de entrada afecta a varias versiones del sistema operativo QNAP. Si se explota, la vulnerabilidad podría permitir a los administradores autenticados ejecutar código a través de una red. Ya hemos solucionado la vulnerabilidad en las siguientes versiones:
QTS 5.0.1.2425 compilación 20230609 y posteriores
QTS 5.1.0.2444 compilación 20230629 y posteriores
QTS 4.5.4.2467 compilación 20230718 y posteriores
QuTS hero h5.0.1.2515 compilación 20230907 y posteriores
QuTS hero h5. 1.0.2424 compilación 20230609 y posteriores
QuTS hero h4.5.4.2476 compilación 20230728 y posteriores
QuTScloud c5.1.0.2498 y posteriores

*Credits: Jiaxu Zhao && Bingwei Peng
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-05-16 CVE Reserved
  • 2023-10-06 CVE Published
  • 2024-09-19 CVE Updated
  • 2024-10-12 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • CWE-121: Stack-based Buffer Overflow
  • CWE-787: Out-of-bounds Write
CAPEC
  • CAPEC-100: Overflow Buffers
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Qnap
Search vendor "Qnap"
Qts
Search vendor "Qnap" for product "Qts"
>= 4.5.0 < 4.5.4.2467
Search vendor "Qnap" for product "Qts" and version " >= 4.5.0 < 4.5.4.2467"
-
Affected
Qnap
Search vendor "Qnap"
Qts
Search vendor "Qnap" for product "Qts"
>= 5.0.0 < 5.0.1.2425
Search vendor "Qnap" for product "Qts" and version " >= 5.0.0 < 5.0.1.2425"
-
Affected
Qnap
Search vendor "Qnap"
Qts
Search vendor "Qnap" for product "Qts"
>= 5.1.0 < 5.1.0.2444
Search vendor "Qnap" for product "Qts" and version " >= 5.1.0 < 5.1.0.2444"
-
Affected
Qnap
Search vendor "Qnap"
Quts Hero
Search vendor "Qnap" for product "Quts Hero"
>= h4.5.0 < h4.5.4.2476
Search vendor "Qnap" for product "Quts Hero" and version " >= h4.5.0 < h4.5.4.2476"
-
Affected
Qnap
Search vendor "Qnap"
Quts Hero
Search vendor "Qnap" for product "Quts Hero"
>= h5.0.0 < h5.0.1.2515
Search vendor "Qnap" for product "Quts Hero" and version " >= h5.0.0 < h5.0.1.2515"
-
Affected
Qnap
Search vendor "Qnap"
Quts Hero
Search vendor "Qnap" for product "Quts Hero"
>= h5.1.0 < h5.1.0.2424
Search vendor "Qnap" for product "Quts Hero" and version " >= h5.1.0 < h5.1.0.2424"
-
Affected
Qnap
Search vendor "Qnap"
Qutscloud
Search vendor "Qnap" for product "Qutscloud"
>= c5.0.1 < c5.1.0.2498
Search vendor "Qnap" for product "Qutscloud" and version " >= c5.0.1 < c5.1.0.2498"
-
Affected