4.2
CVE-2024-32765
- EPSS 0.01%
- Published 12.08.2024 13:38:20
- Last modified 12.08.2024 13:41:36
- Source security@qnapsecurity.com.tw
- Teams watchlist Login
- Open Login
A vulnerability has been reported to affect Network & Virtual Switch. If exploited, the vulnerability could allow local authenticated administrators to gain access to and execute certain functions via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 5.1.8.2823 build 20240712 and later QuTS hero h5.1.8.2823 build 20240712 and later
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorQNAP Systems Inc.
≫
Product
QTS
Default Statusunaffected
Version <
5.1.8.2823 build 20240712
Version
5.1.x
Status
affected
VendorQNAP Systems Inc.
≫
Product
QuTS hero
Default Statusunaffected
Version <
h5.1.8.2823 build 20240712
Version
h5.1.x
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.01% | 0.015 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
security@qnapsecurity.com.tw | 4.2 | 0.8 | 3.4 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
|
CWE-291 Reliance on IP Address for Authentication
The product uses an IP address for authentication.
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.