5.5

CVE-2009-3278

Exploit
The QNAP TS-239 Pro and TS-639 Pro with firmware 2.1.7 0613, 3.1.0 0627, and 3.1.1 0815 use the rand library function to generate a certain recovery key, which makes it easier for local users to determine this key via a brute-force attack.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
QnapTs-239 Pro Firmware Version2.1.7 Updatebuild0613
   QnapTs-239 Pro Version-
QnapTs-239 Pro Firmware Version3.1.0 Updatebuild0627
   QnapTs-239 Pro Version-
QnapTs-239 Pro Firmware Version3.1.1 Updatebuild0815
   QnapTs-239 Pro Version-
QnapTs-639 Pro Firmware Version2.1.7 Updatebuild0613
   QnapTs-639 Pro Version-
QnapTs-639 Pro Firmware Version3.1.0 Updatebuild0627
   QnapTs-639 Pro Version-
QnapTs-639 Pro Firmware Version3.1.1 Updatebuild0815
   QnapTs-639 Pro Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.194
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 4.9 3.9 6.9
AV:L/AC:L/Au:N/C:C/I:N/A:N
CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.