2024-03-08 19:03:27 +00:00
{
"id" : "CVE-2024-21899" ,
"sourceIdentifier" : "security@qnapsecurity.com.tw" ,
"published" : "2024-03-08T17:15:22.587" ,
2024-03-13 15:04:22 +00:00
"lastModified" : "2024-03-13T14:25:02.043" ,
"vulnStatus" : "Analyzed" ,
2024-03-08 19:03:27 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.3.2578 build 20231110 and later\nQTS 4.5.4.2627 build 20231225 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\nQuTScloud c5.1.5.2651 and later\n"
2024-03-13 15:04:22 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se ha informado que una vulnerabilidad de autenticaci\u00f3n incorrecta afecta a varias versiones del sistema operativo QNAP. Si se explota, la vulnerabilidad podr\u00eda permitir a los usuarios comprometer la seguridad del sistema a trav\u00e9s de una red. Ya hemos solucionado la vulnerabilidad en las siguientes versiones: QTS 5.1.3.2578 compilaci\u00f3n 20231110 y posteriores QTS 4.5.4.2627 compilaci\u00f3n 20231225 y posteriores QuTS hero h5.1.3.2578 compilaci\u00f3n 20231110 y posteriores QuTS hero h4.5.4.2626 compilaci\u00f3n 20231225 y posteriores QuTScloud c5.1.5.2651 y posteriores"
2024-03-08 19:03:27 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-03-13 15:04:22 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
} ,
2024-03-08 19:03:27 +00:00
{
"source" : "security@qnapsecurity.com.tw" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "security@qnapsecurity.com.tw" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-287"
}
]
}
] ,
2024-03-13 15:04:22 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.5.4.2627" ,
"matchCriteriaId" : "9A029FCE-B575-452B-9C62-2D38B770D0A5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.1.0" ,
"versionEndExcluding" : "5.1.3.2578" ,
"matchCriteriaId" : "C618F95C-508C-4F21-AA57-08A738B0B625"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:qnap:qts:4.5.4.2627:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "320AEB7E-E07B-42AE-8F71-795A516BA5EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:qnap:qts:5.1.3.2578:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "34ACC24E-E1E8-4014-8DF7-9A85F3D45FF1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "h4.5.4.2626" ,
"matchCriteriaId" : "AFC9334D-F187-400C-8E53-4F746C524047"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "h5.1.0" ,
"versionEndExcluding" : "h5.1.3.2578" ,
"matchCriteriaId" : "2CA49EF2-1EB9-422E-8A26-BA79FFA915A2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:qnap:quts_hero:h4.5.4.2626:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "4CFA8519-D4C0-4ADC-A06B-7694943B06E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:qnap:quts_hero:h5.1.3.2578:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "53222633-E4D8-453D-9A0E-E170CC163D0B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "c5.1.5.2651" ,
"matchCriteriaId" : "F240677F-D84E-464E-B612-B583EE3D877F"
}
]
}
]
}
] ,
2024-03-08 19:03:27 +00:00
"references" : [
{
"url" : "https://www.qnap.com/en/security-advisory/qsa-24-09" ,
2024-03-13 15:04:22 +00:00
"source" : "security@qnapsecurity.com.tw" ,
"tags" : [
"Vendor Advisory"
]
2024-03-08 19:03:27 +00:00
}
]
}