CVE-2024-32764
myQNAPcloud Link
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A missing authentication for critical function vulnerability has been reported to affect myQNAPcloud Link. If exploited, the vulnerability could allow users with the privilege level of some functionality via a network. We have already fixed the vulnerability in the following version:
myQNAPcloud Link 2.4.51 and later
Se ha informado que falta una autenticación para una vulnerabilidad de función crítica que afecta a myQNAPcloud Link. Si se explota, la vulnerabilidad podría permitir a los usuarios con el nivel de privilegio de alguna funcionalidad a través de una red. Ya hemos solucionado la vulnerabilidad en la siguiente versión: myQNAPcloud Link 2.4.51 y posteriores
This vulnerability allows remote attackers to execute arbitrary code on affected installations of QNAP TS-464 NAS devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of the create_session action. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.
A missing authentication for critical function vulnerability has been reported to affect myQNAPcloud Link. If exploited, the vulnerability could allow users with the privilege level of some functionality via a network. We have already fixed the vulnerability in the following version: myQNAPcloud Link 2.4.51 and later
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-04-18 CVE Reserved
- 2024-04-26 CVE Published
- 2024-08-02 CVE Updated
- 2025-06-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-306: Missing Authentication for Critical Function
- CWE-346: Origin Validation Error
- CWE-749: Exposed Dangerous Method or Function
CAPEC
- CAPEC-36: Using Unpublished Interfaces or Functionality
References (1)
URL | Tag | Source |
---|---|---|
https://www.qnap.com/en/security-advisory/qsa-24-09 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qnap Search vendor "Qnap" | Myqnapcloud Link Search vendor "Qnap" for product "Myqnapcloud Link" | * | - |
Affected
|