5.8

CVE-2023-50358

An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.

We have already fixed the vulnerability in the following versions:
QTS 5.1.5.2645 build 20240116 and later
QTS 4.5.4.2627 build 20231225 and later
QTS 4.3.6.2665 build 20240131 and later
QTS 4.3.4.2675 build 20240131 and later
QTS 4.3.3.2644 build 20240131 and later
QTS 4.2.6 build 20240131 and later
QuTS hero h5.1.5.2647 build 20240118 and later
QuTS hero h4.5.4.2626 build 20231225 and later
QuTScloud c5.1.5.2651 and later

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorQNAP Systems Inc.
Product QTS
Default Statusunaffected
Version < 5.1.5.2645 build 20240116
Version 5.x
Status affected
Version < 4.5.4.2627 build 20231225
Version 4.5.x, 4.4.x
Status affected
Version < 4.3.6.2665 build 20240131
Version 4.3.6, 4.3.5
Status affected
Version < 4.3.4.2675 build 20240131
Version 4.3.4
Status affected
Version < 4.3.3.2644 build 20240131
Version 4.3.x
Status affected
Version < 4.2.6 build 20240131
Version 4.2.x
Status affected
VendorQNAP Systems Inc.
Product QuTS hero
Default Statusunaffected
Version < h5.1.5.2647 build 20240118
Version h5.x
Status affected
Version < h4.5.4.2626 build 20231225
Version h4.x
Status affected
VendorQNAP Systems Inc.
Product QuTScloud
Default Statusunaffected
Version < c5.1.5.2651
Version c5.x
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.59% 0.808
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
security@qnapsecurity.com.tw 5.8 1.6 3.7
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.