mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
77 lines
3.1 KiB
JSON
77 lines
3.1 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2024-37043",
|
||
|
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||
|
"published": "2024-11-22T16:15:23.267",
|
||
|
"lastModified": "2024-11-22T16:15:23.267",
|
||
|
"vulnStatus": "Received",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "A path traversal vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to read the contents of unexpected files and expose sensitive data.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.1.2930 build 20241025 and later\nQuTS hero h5.2.1.2929 build 20241025 and later"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV40": [
|
||
|
{
|
||
|
"source": "security@qnapsecurity.com.tw",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "4.0",
|
||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||
|
"baseScore": 5.1,
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"attackRequirements": "NONE",
|
||
|
"privilegesRequired": "HIGH",
|
||
|
"userInteraction": "NONE",
|
||
|
"vulnerableSystemConfidentiality": "NONE",
|
||
|
"vulnerableSystemIntegrity": "LOW",
|
||
|
"vulnerableSystemAvailability": "NONE",
|
||
|
"subsequentSystemConfidentiality": "NONE",
|
||
|
"subsequentSystemIntegrity": "NONE",
|
||
|
"subsequentSystemAvailability": "NONE",
|
||
|
"exploitMaturity": "NOT_DEFINED",
|
||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||
|
"integrityRequirements": "NOT_DEFINED",
|
||
|
"availabilityRequirements": "NOT_DEFINED",
|
||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||
|
"safety": "NOT_DEFINED",
|
||
|
"automatable": "NOT_DEFINED",
|
||
|
"recovery": "NOT_DEFINED",
|
||
|
"valueDensity": "NOT_DEFINED",
|
||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||
|
"providerUrgency": "NOT_DEFINED"
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "security@qnapsecurity.com.tw",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-22"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://www.qnap.com/en/security-advisory/qsa-24-43",
|
||
|
"source": "security@qnapsecurity.com.tw"
|
||
|
}
|
||
|
]
|
||
|
}
|