9.8

CVE-2022-24990

Warnung
Exploit
TerraMaster NAS 4.2.29 and earlier allows remote attackers to discover the administrative password by sending "User-Agent: TNAS" to module/api.php?mobile/webNasIPS and then reading the PWD field in the response.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Terra-masterTerramaster Operating System Version < 4.2.31
   Terra-masterF2-210 Version-
   Terra-masterF2-221 Version-
   Terra-masterF2-223 Version-
   Terra-masterF2-422 Version-
   Terra-masterF2-423 Version-
   Terra-masterF4-421 Version-
   Terra-masterF4-422 Version-
   Terra-masterF4-423 Version-
   Terra-masterF5-221 Version-
   Terra-masterF5-422 Version-
   Terra-masterT12-423 Version-
   Terra-masterT12-450 Version-
   Terra-masterT6-423 Version-
   Terra-masterT9-423 Version-
   Terra-masterT9-450 Version-
   Terra-masterU12-322-9100 Version-
   Terra-masterU12-423 Version-
   Terra-masterU12-722-2224 Version-
   Terra-masterU16-322-9100 Version-
   Terra-masterU16-722-2224 Version-
   Terra-masterU24-722-2224 Version-
   Terra-masterU4-111 Version-
   Terra-masterU4-211 Version-
   Terra-masterU4-423 Version-
   Terra-masterU8-111 Version-
   Terra-masterU8-322-9100 Version-
   Terra-masterU8-423 Version-
   Terra-masterU8-522-9400 Version-
   Terra-masterU8-722-2224 Version-

10.02.2023: CISA Known Exploited Vulnerabilities (KEV) Catalog

TerraMaster OS Remote Command Execution Vulnerability

Schwachstelle

TerraMaster OS contains a remote command execution vulnerability that allows an unauthenticated user to execute commands on the target endpoint.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.4% 1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-306 Missing Authentication for Critical Function

The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.