CVE-2023-32973
QTS, QuTS hero, QuTScloud
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.0.1.2425 build 20230609 and later
QTS 5.1.0.2444 build 20230629 and later
QTS 4.5.4.2467 build 20230718 and later
QuTS hero h5.0.1.2515 build 20230907 and later
QuTS hero h5.1.0.2424 build 20230609 and later
QuTS hero h4.5.4.2476 build 20230728 and later
QuTScloud c5.1.0.2498 and later
Se ha informado que una copia del búfer sin verificar el tamaño de la vulnerabilidad de entrada afecta a varias versiones del sistema operativo QNAP. Si se explota, la vulnerabilidad podría permitir a los administradores autenticados ejecutar código a través de una red. Ya hemos solucionado la vulnerabilidad en las siguientes versiones: QTS 5.0.1.2425 build 20230609 y posteriores QTS 5.1.0.2444 build 20230629 y posteriores QTS 4.5.4.2467 build 20230718 y posteriores QuTS hero h5.0.1.2515 build 20230907 y posteriores QuTS hero h5. 1.0.2424 build 20230609 y posteriores QuTS hero h4.5.4.2476 build 20230728 y posteriores QuTScloud c5.1.0.2498 y posteriores
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-05-16 CVE Reserved
- 2023-10-13 CVE Published
- 2024-09-16 CVE Updated
- 2024-10-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- CWE-121: Stack-based Buffer Overflow
- CWE-787: Out-of-bounds Write
CAPEC
- CAPEC-100: Overflow Buffers
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.qnap.com/en/security-advisory/qsa-23-41 | 2023-10-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qnap Search vendor "Qnap" | Qts Search vendor "Qnap" for product "Qts" | >= 4.5.1 < 4.5.4.2467 Search vendor "Qnap" for product "Qts" and version " >= 4.5.1 < 4.5.4.2467" | - |
Affected
| ||||||
Qnap Search vendor "Qnap" | Qts Search vendor "Qnap" for product "Qts" | >= 5.0.0.1716 < 5.0.1.2425 Search vendor "Qnap" for product "Qts" and version " >= 5.0.0.1716 < 5.0.1.2425" | - |
Affected
| ||||||
Qnap Search vendor "Qnap" | Qts Search vendor "Qnap" for product "Qts" | >= 5.1.0 < 5.1.0.2444 Search vendor "Qnap" for product "Qts" and version " >= 5.1.0 < 5.1.0.2444" | - |
Affected
| ||||||
Qnap Search vendor "Qnap" | Quts Hero Search vendor "Qnap" for product "Quts Hero" | >= h4.5.0 < h4.5.4.2476 Search vendor "Qnap" for product "Quts Hero" and version " >= h4.5.0 < h4.5.4.2476" | - |
Affected
| ||||||
Qnap Search vendor "Qnap" | Quts Hero Search vendor "Qnap" for product "Quts Hero" | >= h5.0.0 < h5.0.1.2515 Search vendor "Qnap" for product "Quts Hero" and version " >= h5.0.0 < h5.0.1.2515" | - |
Affected
| ||||||
Qnap Search vendor "Qnap" | Quts Hero Search vendor "Qnap" for product "Quts Hero" | >= h5.1.0 < h5.1.0.2424 Search vendor "Qnap" for product "Quts Hero" and version " >= h5.1.0 < h5.1.0.2424" | - |
Affected
| ||||||
Qnap Search vendor "Qnap" | Qutscloud Search vendor "Qnap" for product "Qutscloud" | >= c5.0.0.1919 < c5.1.0.2498 Search vendor "Qnap" for product "Qutscloud" and version " >= c5.0.0.1919 < c5.1.0.2498" | - |
Affected
|