2025-02-12 21:03:54 +00:00

253 lines
7.7 KiB
JSON

{
"id": "CVE-2022-27593",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2022-09-08T11:15:19.503",
"lastModified": "2025-02-12T20:57:32.540",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An externally controlled reference to a resource vulnerability has been reported to affect QNAP NAS running Photo Station. If exploited, This could allow an attacker to modify system files. We have already fixed the vulnerability in the following versions: QTS 5.0.1: Photo Station 6.1.2 and later QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later QTS 4.3.6: Photo Station 5.7.18 and later QTS 4.3.3: Photo Station 5.4.15 and later QTS 4.2.6: Photo Station 5.2.14 and later"
},
{
"lang": "es",
"value": "Se ha informado una vulnerabilidad de recursos de referencia controlada externamente afecta al QNAP NAS que ejecuta Photo Station. Si se explota, esto podr\u00eda permitir a un atacante modificar los archivos del sistema. Ya hemos corregido la vulnerabilidad en las siguientes versiones: QTS versiones 5.0.1: Photo Station versiones 6.1.2 y posteriores QTS versiones 5.0.0/4.5.x: Photo Station versiones 6.0.22 y posteriores QTS versiones 4.3.6: Photo Station versiones 5.7.18 y posteriores QTS versiones 4.3.3: Photo Station versiones 5.4.15 y posteriores QTS versiones 4.2.6: Photo Station versiones 5.2.14 y posteriores"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"cisaExploitAdd": "2022-09-08",
"cisaActionDue": "2022-09-29",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "QNAP Photo Station Externally Controlled Reference Vulnerability",
"weaknesses": [
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-610"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-610"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.2.14",
"matchCriteriaId": "334FA052-177C-4583-9919-BB4EB9DC91A1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:qnap:qts:4.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9E6F8F-A433-45A7-8839-5D478FE179A4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.15",
"matchCriteriaId": "2416B1E4-88F1-4601-AC15-D11B7BB9EB7D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:qnap:qts:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5994C07-17FE-4784-9FA4-9675BA8B4743"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.7.18",
"matchCriteriaId": "EF59D0C3-74CF-448A-935D-7C436330ABFD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9FAC96-AA2A-4CA5-A170-8C0E6BD47391"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.22",
"matchCriteriaId": "12A590AE-13D5-4F8F-802D-4331B63D5C0C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5.1",
"versionEndIncluding": "4.5.4.2012",
"matchCriteriaId": "36C84C4C-AAE2-4AC5-A723-64271BBB91A5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:qnap:qts:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC98874F-5D92-481D-B4E2-EC548727719C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.2",
"matchCriteriaId": "BCB176FD-5FC1-4003-B336-6B51D8AC36DD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:qnap:qts:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B21E1993-94A3-4D65-ADB7-70DDB919AF8D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-22-24",
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.qnap.com/en/security-advisory/qsa-22-24",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}