{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2022-27592", "ASSIGNER": "security@qnap.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "An unquoted search path or element vulnerability has been reported to affect QVR Smart Client. If exploited, the vulnerability could allow local authenticated administrators to execute unauthorized code or commands via unspecified vectors.\n\nWe have already fixed the vulnerability in the following version:\nWindows 10 SP1, Windows 11, Mac OS, and Mac M1: QVR Smart Client 2.4.0.0570 and later" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-428", "cweId": "CWE-428" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "QNAP Systems Inc.", "product": { "product_data": [ { "product_name": "QVR Smart Client", "version": { "version_data": [ { "version_affected": "<", "version_name": "2.4.x.x", "version_value": "2.4.0.0570" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-22", "refsource": "MISC", "name": "https://www.qnap.com/en/security-advisory/qsa-24-22" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "source": { "advisory": "QSA-24-22", "discovery": "EXTERNAL" }, "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "We have already fixed the vulnerability in the following version:
Windows 10 SP1, Windows 11, Mac OS, and Mac M1: QVR Smart Client 2.4.0.0570 and later
" } ], "value": "We have already fixed the vulnerability in the following version:\nWindows 10 SP1, Windows 11, Mac OS, and Mac M1: QVR Smart Client 2.4.0.0570 and later" } ], "credits": [ { "lang": "en", "value": "Runzi Zhao, Security Researcher, QI-ANXIN" } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ] } }