cvelist/2024/38xxx/CVE-2024-38646.json

91 lines
2.9 KiB
JSON
Raw Normal View History

2024-06-19 01:00:32 +00:00
{
2024-11-22 16:00:33 +00:00
"data_version": "4.0",
2024-06-19 01:00:32 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-38646",
2024-11-22 16:00:33 +00:00
"ASSIGNER": "security@qnap.com",
"STATE": "PUBLIC"
2024-06-19 01:00:32 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-11-22 16:00:33 +00:00
"value": "An incorrect permission assignment for critical resource vulnerability has been reported to affect Notes Station 3. If exploited, the vulnerability could allow local authenticated attackers who have gained administrator access to read or modify the resource.\n\nWe have already fixed the vulnerability in the following version:\nNotes Station 3 3.9.7 and later"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-732",
"cweId": "CWE-732"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "QNAP Systems Inc.",
"product": {
"product_data": [
{
"product_name": "Notes Station 3",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "3.9.x",
"version_value": "3.9.7"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-24-36",
"refsource": "MISC",
"name": "https://www.qnap.com/en/security-advisory/qsa-24-36"
2024-06-19 01:00:32 +00:00
}
]
2024-11-22 16:00:33 +00:00
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "QSA-24-36",
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "We have already fixed the vulnerability in the following version:<br>Notes Station 3 3.9.7 and later<br>"
}
],
"value": "We have already fixed the vulnerability in the following version:\nNotes Station 3 3.9.7 and later"
}
],
"credits": [
{
"lang": "en",
"value": "Thomas Fady"
}
]
2024-06-19 01:00:32 +00:00
}