- Description
- This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions.
- Source
- security@qnapsecurity.com.tw
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Data from CISA
- Vulnerability name
- QNAP QTS Improper Input Validation Vulnerability
- Exploit added on
- Jun 8, 2022
- Exploit action due
- Jun 22, 2022
- Required action
- Apply updates per vendor instructions.
- nvd@nist.gov
- NVD-CWE-noinfo
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-20
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0895:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B52AEDE0-990A-4186-8F24-8CF4068E5AF1"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0907:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C6EFB589-B6E1-410C-9AA5-86DD2CF7FFCD"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0923:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "09573613-AD98-4A49-A960-B9E45B612710"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0944:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "561532B6-0678-410B-8211-76103EBAA9D9"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0959:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C58608A2-7705-4DE7-8979-DE33A35DDA88"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0979:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "90E2874F-BD7C-48AF-ABCE-D96F51947A70"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0993:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D4347075-F444-4271-A717-FDABF8C19D7C"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.1013:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6F8FB702-0BB9-419E-A847-AC9CC31F823F"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.1033:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2514D352-5007-4669-A526-F179BABB0587"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.4.1.0948:beta:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C0EDB4B0-42CD-42E4-8EA6-6C7E6946608F"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.4.1.0949:beta:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "94179DF2-2E1F-4673-B834-987BEE24242B"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.4.1.0978:beta_2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2768EC66-AE75-405B-B92B-547840C10D78"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.4.1.0998:beta_3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F83BCDD9-5227-4677-B174-65C653EEDBA1"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.4.1.0999:beta_3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B3AFEC02-4082-4CF2-BDEF-B42CAF6C2AAE"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.4.1.1031:beta_4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0E4BC7EF-8E5C-4D4A-9365-28DA0CC0E879"
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.4.1.1033:beta_4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "491637BB-CF44-43FE-8FF1-AAA22E848B64"
}
],
"operator": "OR"
}
]
}
]