An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.5.2645 build 20240116 and later
QTS 4.5.4.2627 build 20231225 and later
QuTS hero h5.1.5.2647 build 20240118 and later
QuTS hero h4.5.4.2626 build 20231225 and later
QuTScloud c5.1.5.2651 and later
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-24-05 |
![]() ![]() |
History
Thu, 07 Nov 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2024-11-07T21:13:10.959Z
Reserved: 2023-11-06T14:11:12.323Z
Link: CVE-2023-47567

Updated: 2024-08-02T21:09:37.353Z

Status : Modified
Published: 2024-02-02T16:15:52.667
Modified: 2024-11-21T08:30:28.390
Link: CVE-2023-47567

No data.