Refine your search
51 vulnerabilities found for QTS by Qnap
CERTFR-2025-AVI-0486
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Qnap | QTS | QTS versions 5.2.x antérieures à 5.2.4.3079 build 20250321 | ||
Qnap | QuRouter | QuRouter versions 2.4.x et 2.5.x antérieures à 2.5.0.140 | ||
Qnap | QuTS hero | QuTS hero versions h5.2.x antérieures à h5.2.4.3079 build 20250321 | ||
Qnap | License Center | License Center versions 1.9.x antérieures à 1.9.49 | ||
Qnap | File Station | File Station 5 versions 5.5.x antérieures à 5.5.6.4847 | ||
Qnap | Qsync | Qsync Central versions 4.5.x antérieures à 4.5.0.6 | ||
Qnap | QES | QES versions 2.2.x antérieures à 2.2.1 build 20250304 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QTS versions 5.2.x ant\u00e9rieures \u00e0 5.2.4.3079 build 20250321", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuRouter versions 2.4.x et 2.5.x ant\u00e9rieures \u00e0 2.5.0.140", "product": { "name": "QuRouter", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.2.x ant\u00e9rieures \u00e0 h5.2.4.3079 build 20250321", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "License Center versions 1.9.x ant\u00e9rieures \u00e0 1.9.49", "product": { "name": "License Center", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "File Station 5 versions 5.5.x ant\u00e9rieures \u00e0 5.5.6.4847", "product": { "name": "File Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qsync Central versions 4.5.x ant\u00e9rieures \u00e0 4.5.0.6", "product": { "name": "Qsync", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QES versions 2.2.x ant\u00e9rieures \u00e0 2.2.1 build 20250304", "product": { "name": "QES", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-26465", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26465" }, { "name": "CVE-2025-33031", "url": "https://www.cve.org/CVERecord?id=CVE-2025-33031" }, { "name": "CVE-2024-56805", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56805" }, { "name": "CVE-2024-50406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50406" }, { "name": "CVE-2025-22482", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22482" }, { "name": "CVE-2025-26466", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26466" }, { "name": "CVE-2025-29872", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29872" }, { "name": "CVE-2025-29892", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29892" }, { "name": "CVE-2025-22490", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22490" }, { "name": "CVE-2025-29873", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29873" }, { "name": "CVE-2025-29884", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29884" }, { "name": "CVE-2025-33035", "url": "https://www.cve.org/CVERecord?id=CVE-2025-33035" }, { "name": "CVE-2025-29876", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29876" }, { "name": "CVE-2025-22485", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22485" }, { "name": "CVE-2024-13087", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13087" }, { "name": "CVE-2025-22484", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22484" }, { "name": "CVE-2023-28370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28370" }, { "name": "CVE-2025-29877", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29877" }, { "name": "CVE-2025-29883", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29883" }, { "name": "CVE-2025-30279", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30279" }, { "name": "CVE-2025-22486", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22486" }, { "name": "CVE-2025-29871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29871" }, { "name": "CVE-2024-6387", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6387" }, { "name": "CVE-2025-22481", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22481" }, { "name": "CVE-2024-13088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13088" }, { "name": "CVE-2025-29885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29885" } ], "initial_release_date": "2025-06-10T00:00:00", "last_revision_date": "2025-06-10T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0486", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-10T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Injection SQL (SQLi)" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": "2025-06-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-17", "url": "https://www.qnap.com/go/security-advisory/qsa-25-17" }, { "published_at": "2025-06-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-11", "url": "https://www.qnap.com/go/security-advisory/qsa-25-11" }, { "published_at": "2025-06-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-14", "url": "https://www.qnap.com/go/security-advisory/qsa-25-14" }, { "published_at": "2025-06-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-10", "url": "https://www.qnap.com/go/security-advisory/qsa-25-10" }, { "published_at": "2025-06-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-09", "url": "https://www.qnap.com/go/security-advisory/qsa-25-09" }, { "published_at": "2025-06-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-15", "url": "https://www.qnap.com/go/security-advisory/qsa-25-15" }, { "published_at": "2025-06-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-13", "url": "https://www.qnap.com/go/security-advisory/qsa-25-13" }, { "published_at": "2025-06-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-16", "url": "https://www.qnap.com/go/security-advisory/qsa-25-16" }, { "published_at": "2025-06-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-12", "url": "https://www.qnap.com/go/security-advisory/qsa-25-12" } ] }
CERTFR-2025-AVI-0188
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Qnap | HBS 3 Hybrid Backup Sync | HBS 3 Hybrid Backup Sync versions 25.1.x antérieures à 25.1.4.952 | ||
Qnap | QuTS hero | QuTS hero versions h5.1.x antérieures à h5.1.9.2954 build 20241120 | ||
Qnap | QuLog Center | QuLog Center versions 1.8.x antérieures à 1.8.0.888 | ||
Qnap | File Station | File Station versions 5.5.x antérieures à 5.5.6.4741 | ||
Qnap | QTS | QTS versions 5.1.x antérieures à 5.1.9.2954 build 20241120 | ||
Qnap | Helpdesk | Helpdesk versions 3.3.x antérieurs à 3.3.3 | ||
Qnap | QuRouter | QuRouter versions 2.4.x antérieures à 2.4.6.028 | ||
Qnap | QVPN | QVPN Device Client versions 2.2.x antérieures à 2.2.5 pour Mac | ||
Qnap | QTS | QTS versions 5.2.x antérieures à 5.2.3.3006 build 20250108 | ||
Qnap | QTS | QTS versions 4.5.x antérieures à 4.5.4.2957 build 20241119 | ||
Qnap | QuTS hero | QuTS hero versions h4.5.x antérieures à h4.5.4.2956 build 20241119 | ||
Qnap | QuLog Center | QuLog Center versions 1.7.x antérieures à 1.7.0.829 | ||
Qnap | Qsync | Qsync Client versions 5.1.x antérieures à 5.1.3 pour Mac | ||
Qnap | QuTS hero | QuTS hero versions h5.2.x antérieures à h5.2.3.3006 build 20250108 | ||
Qnap | Qfinder | Qfinder Pro Mac versions 7.11.x antérieures à 7.11.1 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "HBS 3 Hybrid Backup Sync versions 25.1.x ant\u00e9rieures \u00e0 25.1.4.952", "product": { "name": "HBS 3 Hybrid Backup Sync", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.9.2954 build 20241120", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuLog Center versions 1.8.x ant\u00e9rieures \u00e0 1.8.0.888", "product": { "name": "QuLog Center", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "File Station versions 5.5.x ant\u00e9rieures \u00e0 5.5.6.4741", "product": { "name": "File Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.9.2954 build 20241120", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Helpdesk versions 3.3.x ant\u00e9rieurs \u00e0 3.3.3", "product": { "name": "Helpdesk", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuRouter versions 2.4.x ant\u00e9rieures \u00e0 2.4.6.028", "product": { "name": "QuRouter", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QVPN Device Client versions 2.2.x ant\u00e9rieures \u00e0 2.2.5 pour Mac", "product": { "name": "QVPN", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.2.x ant\u00e9rieures \u00e0 5.2.3.3006 build 20250108", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2957 build 20241119", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2956 build 20241119", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuLog Center versions 1.7.x ant\u00e9rieures \u00e0 1.7.0.829", "product": { "name": "QuLog Center", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qsync Client versions 5.1.x ant\u00e9rieures \u00e0 5.1.3 pour Mac", "product": { "name": "Qsync", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.2.x ant\u00e9rieures \u00e0 h5.2.3.3006 build 20250108", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qfinder Pro Mac versions 7.11.x ant\u00e9rieures \u00e0 7.11.1", "product": { "name": "Qfinder", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-53695", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53695" }, { "name": "CVE-2024-50390", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50390" }, { "name": "CVE-2024-53700", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53700" }, { "name": "CVE-2024-53696", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53696" }, { "name": "CVE-2024-53698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53698" }, { "name": "CVE-2024-53693", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53693" }, { "name": "CVE-2024-53694", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53694" }, { "name": "CVE-2024-53697", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53697" }, { "name": "CVE-2024-48864", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48864" }, { "name": "CVE-2024-50394", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50394" }, { "name": "CVE-2024-13086", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13086" }, { "name": "CVE-2024-53699", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53699" }, { "name": "CVE-2024-53692", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53692" }, { "name": "CVE-2024-50405", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50405" }, { "name": "CVE-2024-38638", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38638" } ], "initial_release_date": "2025-03-10T00:00:00", "last_revision_date": "2025-03-10T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0188", "revisions": [ { "description": "Version initiale", "revision_date": "2025-03-10T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": "2025-03-08", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-03", "url": "https://www.qnap.com/go/security-advisory/qsa-25-03" }, { "published_at": "2025-03-08", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-55", "url": "https://www.qnap.com/go/security-advisory/qsa-24-55" }, { "published_at": "2025-03-08", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-52", "url": "https://www.qnap.com/go/security-advisory/qsa-24-52" }, { "published_at": "2025-03-08", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-06", "url": "https://www.qnap.com/go/security-advisory/qsa-25-06" }, { "published_at": "2025-03-08", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-53", "url": "https://www.qnap.com/go/security-advisory/qsa-24-53" }, { "published_at": "2025-03-08", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-07", "url": "https://www.qnap.com/go/security-advisory/qsa-25-07" }, { "published_at": "2025-03-08", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-05", "url": "https://www.qnap.com/go/security-advisory/qsa-25-05" }, { "published_at": "2025-03-08", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-01", "url": "https://www.qnap.com/go/security-advisory/qsa-25-01" }, { "published_at": "2025-03-08", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-54", "url": "https://www.qnap.com/go/security-advisory/qsa-24-54" }, { "published_at": "2025-03-08", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-51", "url": "https://www.qnap.com/go/security-advisory/qsa-24-51" } ] }
CERTFR-2024-AVI-1052
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Qnap | QuTS hero | QuTS hero versions h5.2.x antérieures à h5.2.2.2952 build 20241116 | ||
Qnap | QuTS hero | QuTS hero versions h5.1.x antérieures à h5.1.9.2954 build 20241120 | ||
Qnap | QTS | QTS versions 5.1.x antérieures à 5.1.9.2954 build 20241120 | ||
Qnap | License Center | License Center versions 1.9.x antérieures à 1.9.43 | ||
Qnap | QTS | QTS versions 5.2.x antérieures à 5.2.2.2950 build 20241114 | ||
Qnap | Qsync Central | Qsync Central versions 4.4.x antérieures à 4.4.0.16_20240819 ( 2024/08/19 ) |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QuTS hero versions h5.2.x ant\u00e9rieures \u00e0 h5.2.2.2952 build 20241116", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.9.2954 build 20241120", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.9.2954 build 20241120", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "License Center versions 1.9.x ant\u00e9rieures \u00e0 1.9.43", "product": { "name": "License Center", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.2.x ant\u00e9rieures \u00e0 5.2.2.2950 build 20241114", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qsync Central versions 4.4.x ant\u00e9rieures \u00e0 4.4.0.16_20240819 ( 2024/08/19 )", "product": { "name": "Qsync Central", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-50404", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50404" }, { "name": "CVE-2024-50403", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50403" }, { "name": "CVE-2024-50402", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50402" }, { "name": "CVE-2024-48866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48866" }, { "name": "CVE-2024-48867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48867" }, { "name": "CVE-2024-48863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48863" }, { "name": "CVE-2024-48868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48868" }, { "name": "CVE-2024-48859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48859" }, { "name": "CVE-2024-50393", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50393" }, { "name": "CVE-2024-48865", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48865" } ], "initial_release_date": "2024-12-09T00:00:00", "last_revision_date": "2024-12-09T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-1052", "revisions": [ { "description": "Version initiale", "revision_date": "2024-12-09T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": "2024-12-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-50", "url": "https://www.qnap.com/go/security-advisory/qsa-24-50" }, { "published_at": "2024-12-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-48", "url": "https://www.qnap.com/go/security-advisory/qsa-24-48" }, { "published_at": "2024-12-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-49", "url": "https://www.qnap.com/go/security-advisory/qsa-24-49" } ] }
CERTFR-2024-AVI-1018
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Qnap | N/A | Photo Station versions 6.4.x antérieures à 6.4.3 | ||
Qnap | QuRouter | QuRouter versions 2.4.x antérieures à 2.4.4.106 | ||
Qnap | QuLog Center | QuLog Center versions 1.8.x antérieures à 1.8.0.888 | ||
Qnap | QuRouter | QuRouter versions 2.4.x antérieures à 2.4.3.103 | ||
Qnap | QuTS hero | QuTS hero versions h5.2.x antérieures à h5.2.1.2929 build 20241025 | ||
Qnap | N/A | Notes Station 3 versions 3.9.x antérieures à 3.9.7 | ||
Qnap | QuTS hero | QuTS hero versions h5.1.x antérieures à h5.1.8.2823 build 20240712 | ||
Qnap | QTS | QTS versions 5.1.x antérieures à 5.1.8.2823 build 20240712 | ||
Qnap | N/A | Media Streaming add-on versions 500.1.x antérieures à 500.1.1.6 | ||
Qnap | QTS | QTS versions 5.2.x antérieures à 5.2.1.2930 build 20241025 | ||
Qnap | N/A | QNAP AI Core versions 3.4.x antérieures à 3.4.1 | ||
Qnap | QuLog Center | QuLog Center versions 1.7.x antérieures à 1.7.0.831 |
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Photo Station versions 6.4.x ant\u00e9rieures \u00e0 6.4.3", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuRouter versions 2.4.x ant\u00e9rieures \u00e0 2.4.4.106", "product": { "name": "QuRouter", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuLog Center versions 1.8.x ant\u00e9rieures \u00e0 1.8.0.888", "product": { "name": "QuLog Center", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuRouter versions 2.4.x ant\u00e9rieures \u00e0 2.4.3.103", "product": { "name": "QuRouter", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.2.x ant\u00e9rieures \u00e0 h5.2.1.2929 build 20241025", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Notes Station 3 versions 3.9.x ant\u00e9rieures \u00e0 3.9.7", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.8.2823 build 20240712", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.8.2823 build 20240712", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Media Streaming add-on versions 500.1.x ant\u00e9rieures \u00e0 500.1.1.6", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.2.x ant\u00e9rieures \u00e0 5.2.1.2930 build 20241025", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP AI Core versions 3.4.x ant\u00e9rieures \u00e0 3.4.1", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuLog Center versions 1.7.x ant\u00e9rieures \u00e0 1.7.0.831 ", "product": { "name": "QuLog Center", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-50397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50397" }, { "name": "CVE-2024-37050", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37050" }, { "name": "CVE-2024-38643", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38643" }, { "name": "CVE-2024-50398", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50398" }, { "name": "CVE-2024-37042", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37042" }, { "name": "CVE-2024-32768", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32768" }, { "name": "CVE-2024-48860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48860" }, { "name": "CVE-2024-50399", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50399" }, { "name": "CVE-2024-48861", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48861" }, { "name": "CVE-2024-48862", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48862" }, { "name": "CVE-2024-32770", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32770" }, { "name": "CVE-2024-37049", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37049" }, { "name": "CVE-2024-38644", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38644" }, { "name": "CVE-2024-37041", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37041" }, { "name": "CVE-2024-37048", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37048" }, { "name": "CVE-2024-50396", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50396" }, { "name": "CVE-2024-32767", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32767" }, { "name": "CVE-2024-37045", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37045" }, { "name": "CVE-2024-38647", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38647" }, { "name": "CVE-2024-37046", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37046" }, { "name": "CVE-2024-37047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37047" }, { "name": "CVE-2023-38408", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38408" }, { "name": "CVE-2024-32769", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32769" }, { "name": "CVE-2024-50400", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50400" }, { "name": "CVE-2020-14145", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14145" }, { "name": "CVE-2024-38645", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38645" }, { "name": "CVE-2024-50395", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50395" }, { "name": "CVE-2024-37043", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37043" }, { "name": "CVE-2021-41617", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41617" }, { "name": "CVE-2024-38646", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38646" }, { "name": "CVE-2024-37044", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37044" }, { "name": "CVE-2024-50401", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50401" } ], "initial_release_date": "2024-11-25T00:00:00", "last_revision_date": "2024-11-25T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-1018", "revisions": [ { "description": "Version initiale", "revision_date": "2024-11-25T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": "2024-11-23", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-44", "url": "https://www.qnap.com/go/security-advisory/qsa-24-44" }, { "published_at": "2024-11-23", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-36", "url": "https://www.qnap.com/go/security-advisory/qsa-24-36" }, { "published_at": "2024-11-23", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-37", "url": "https://www.qnap.com/go/security-advisory/qsa-24-37" }, { "published_at": "2024-11-23", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-39", "url": "https://www.qnap.com/go/security-advisory/qsa-24-39" }, { "published_at": "2024-11-23", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-47", "url": "https://www.qnap.com/go/security-advisory/qsa-24-47" }, { "published_at": "2024-11-23", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-40", "url": "https://www.qnap.com/go/security-advisory/qsa-24-40" }, { "published_at": "2024-11-23", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-46", "url": "https://www.qnap.com/go/security-advisory/qsa-24-46" }, { "published_at": "2024-11-23", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-43", "url": "https://www.qnap.com/go/security-advisory/qsa-24-43" } ] }
CERTFR-2024-AVI-0752
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Qnap | QuTS hero | QuTS hero versions h4.5.x antérieures à h4.5.4.2790 build 20240606 | ||
Qnap | QTS | QTS versions 4.3.4 antérieures à 4.3.4.2814 build 20240618 | ||
Qnap | Download Station | Download Station versions 5.8.x antérieures à 5.8.6.283 | ||
Qnap | QTS | QTS versions 4.3.3 antérieures à 4.3.3.2784 build 20240619 | ||
Qnap | QuMagie | QuMagie versions 2.3.x antérieures à 2.3.1 | ||
Qnap | QTS | QTS versions 4.2.6 antérieures à 4.2.6 build 20240618 | ||
Qnap | QTS | QTS versions 4.3.6 antérieures à 4.3.6.2805 build 20240619 | ||
Qnap | Helpdesk | Helpdesk versions 3.3.x antérieures à 3.3.1 | ||
Qnap | Notes Station | Notes Station 3 versions 3.9.x antérieures à 3.9.6 | ||
Qnap | QTS | QTS versions 5.1.x antérieures à 5.2.0.2782 build 20240601 | ||
Qnap | QuTS hero | QuTS hero versions h4.5.x antérieures à h4.5.4.2626 build 20231225 | ||
Qnap | QuTS hero | QuTS hero versions h5.1.x antérieures à h5.2.0.2782 build 20240601 | ||
Qnap | Music Station | Music Station versions 5.4.x antérieures à 5.4.0 | ||
Qnap | Video Station | Video Station versions 5.8.x antérieures à 5.8.2 | ||
Qnap | QTS | QTS versions 4.5.x antérieures à 4.5.4.2790 build 20240605 | ||
Qnap | QuLog Center | QuLog Center versions 1.7.x.x antérieures à 1.7.0.827 | ||
Qnap | QuLog Center | QuLog Center versions 1.8.x.x antérieures à 1.8.0.872 | ||
Qnap | QVR | QVR Smart Client versions 2.4.x.x antérieures à 2.4.0.0570 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2790 build 20240606", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.3.4 ant\u00e9rieures \u00e0 4.3.4.2814 build 20240618", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Download Station versions 5.8.x ant\u00e9rieures \u00e0 5.8.6.283", "product": { "name": "Download Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.3.3 ant\u00e9rieures \u00e0 4.3.3.2784 build 20240619", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuMagie versions 2.3.x ant\u00e9rieures \u00e0 2.3.1", "product": { "name": "QuMagie", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.2.6 ant\u00e9rieures \u00e0 4.2.6 build 20240618", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.3.6 ant\u00e9rieures \u00e0 4.3.6.2805 build 20240619", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Helpdesk versions 3.3.x ant\u00e9rieures \u00e0 3.3.1", "product": { "name": "Helpdesk", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Notes Station 3 versions 3.9.x ant\u00e9rieures \u00e0 3.9.6", "product": { "name": "Notes Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.2.0.2782 build 20240601", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2626 build 20231225", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.2.0.2782 build 20240601", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Music Station versions 5.4.x ant\u00e9rieures \u00e0 5.4.0", "product": { "name": "Music Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Video Station versions 5.8.x ant\u00e9rieures \u00e0 5.8.2", "product": { "name": "Video Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2790 build 20240605", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuLog Center versions 1.7.x.x ant\u00e9rieures \u00e0 1.7.0.827", "product": { "name": "QuLog Center", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuLog Center versions 1.8.x.x ant\u00e9rieures \u00e0 1.8.0.872", "product": { "name": "QuLog Center", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QVR Smart Client versions 2.4.x.x ant\u00e9rieures \u00e0 2.4.0.0570", "product": { "name": "QVR", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2022-27592", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27592" }, { "name": "CVE-2023-50360", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50360" }, { "name": "CVE-2024-32762", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32762" }, { "name": "CVE-2024-21906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21906" }, { "name": "CVE-2024-38640", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38640" }, { "name": "CVE-2024-53691", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53691" }, { "name": "CVE-2023-34974", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34974" }, { "name": "CVE-2024-27125", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27125" }, { "name": "CVE-2024-32763", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32763" }, { "name": "CVE-2024-27126", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27126" }, { "name": "CVE-2023-47563", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47563" }, { "name": "CVE-2024-38641", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38641" }, { "name": "CVE-2024-38642", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38642" }, { "name": "CVE-2023-34979", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34979" }, { "name": "CVE-2023-39298", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39298" }, { "name": "CVE-2023-39300", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39300" }, { "name": "CVE-2023-45038", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45038" }, { "name": "CVE-2024-32771", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32771" }, { "name": "CVE-2023-38545", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545" }, { "name": "CVE-2024-27122", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27122" } ], "initial_release_date": "2024-09-09T00:00:00", "last_revision_date": "2025-01-21T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0752", "revisions": [ { "description": "Version initiale", "revision_date": "2024-09-09T00:00:00.000000" }, { "description": "Ajout de l\u0027identifiant CVE-2024-53691.", "revision_date": "2025-01-21T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-24", "url": "https://www.qnap.com/go/security-advisory/qsa-24-24" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-26", "url": "https://www.qnap.com/go/security-advisory/qsa-24-26" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-34", "url": "https://www.qnap.com/go/security-advisory/qsa-24-34" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-30", "url": "https://www.qnap.com/go/security-advisory/qsa-24-30" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-21", "url": "https://www.qnap.com/go/security-advisory/qsa-24-21" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-27", "url": "https://www.qnap.com/go/security-advisory/qsa-24-27" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-29", "url": "https://www.qnap.com/go/security-advisory/qsa-24-29" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-28", "url": "https://www.qnap.com/go/security-advisory/qsa-24-28" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-32", "url": "https://www.qnap.com/go/security-advisory/qsa-24-32" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-25", "url": "https://www.qnap.com/go/security-advisory/qsa-24-25" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-33", "url": "https://www.qnap.com/go/security-advisory/qsa-24-33" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-22", "url": "https://www.qnap.com/go/security-advisory/qsa-24-22" }, { "published_at": "2024-09-07", "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-35", "url": "https://www.qnap.com/go/security-advisory/qsa-24-35" } ] }
CERTFR-2024-AVI-0428
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.7.2770 build 20240520", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.7.2770 build 20240520", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-21902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21902" }, { "name": "CVE-2024-27128", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27128" }, { "name": "CVE-2024-27127", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27127" }, { "name": "CVE-2024-27130", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27130" }, { "name": "CVE-2024-27129", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27129" } ], "initial_release_date": "2024-05-22T00:00:00", "last_revision_date": "2024-05-22T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0428", "revisions": [ { "description": "Version initiale", "revision_date": "2024-05-22T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": "2024-05-21", "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-23", "url": "https://www.qnap.com/go/security-advisory/qsa-24-23" } ] }
CERTFR-2024-AVI-0354
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | N/A | QuTScloud versions c5.x antérieures à c5.1.5.2651 | ||
Qnap | QTS | QTS versions 5.1.x antérieures à 5.1.6.2722 build 20240402 | ||
Qnap | QTS | QTS versions 4.5.x antérieures à 4.5.4.2627 build 20231225 | ||
Qnap | QuTS hero | QuTS hero versions h4.5.x antérieures à h4.5.4.2626 build 20231225 | ||
Qnap | N/A | myQNAPcloud versions 1.0.x antérieures à 1.0.52 | ||
Qnap | N/A | Proxy Server versions 1.4.x antérieures à 1.4.6 | ||
Qnap | N/A | myQNAPcloud Link versions 2.4.x antérieures à 2.4.51 | ||
Qnap | N/A | Media Streaming add-on versions 500.1.x antérieures à 500.1.1.5 | ||
Qnap | QuTS hero | QuTS hero versions h5.1.x antérieures à h5.1.6.2734 build 20240414 | ||
Qnap | N/A | QuFirewall versions 2.4.x antérieures à 2.4.1 |
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.5.2651", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.6.2722 build 20240402", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2627 build 20231225", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2626 build 20231225", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "myQNAPcloud versions 1.0.x ant\u00e9rieures \u00e0 1.0.52", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Proxy Server versions 1.4.x ant\u00e9rieures \u00e0 1.4.6", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "myQNAPcloud Link versions 2.4.x ant\u00e9rieures \u00e0 2.4.51", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Media Streaming add-on versions 500.1.x ant\u00e9rieures \u00e0 500.1.1.5", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.6.2734 build 20240414", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuFirewall versions 2.4.x ant\u00e9rieures \u00e0 2.4.1", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2024-32766", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32766" }, { "name": "CVE-2023-5824", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5824" }, { "name": "CVE-2024-27124", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27124" }, { "name": "CVE-2023-50363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50363" }, { "name": "CVE-2023-46846", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46846" }, { "name": "CVE-2023-46847", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46847" }, { "name": "CVE-2023-41290", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41290" }, { "name": "CVE-2024-21905", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21905" }, { "name": "CVE-2023-46724", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46724" }, { "name": "CVE-2024-21900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21900" }, { "name": "CVE-2023-41291", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41291" }, { "name": "CVE-2023-51365", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51365" }, { "name": "CVE-2024-21901", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21901" }, { "name": "CVE-2024-32764", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32764" }, { "name": "CVE-2023-50364", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50364" }, { "name": "CVE-2024-21899", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21899" }, { "name": "CVE-2023-51364", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51364" }, { "name": "CVE-2023-50362", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50362" }, { "name": "CVE-2023-47222", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47222" }, { "name": "CVE-2023-50361", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50361" } ], "initial_release_date": "2024-04-29T00:00:00", "last_revision_date": "2024-04-29T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0354", "revisions": [ { "description": "Version initiale", "revision_date": "2024-04-29T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de\ns\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-16 du 26 avril 2024", "url": "https://www.qnap.com/go/security-advisory/qsa-24-16" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-15 du 26 avril 2024", "url": "https://www.qnap.com/go/security-advisory/qsa-24-15" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-18 du 26 avril 2024", "url": "https://www.qnap.com/go/security-advisory/qsa-24-18" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-14 du 26 avril 2024", "url": "https://www.qnap.com/go/security-advisory/qsa-24-14" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-20 du 26 avril 2024", "url": "https://www.qnap.com/go/security-advisory/qsa-24-20" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-17 du 26 avril 2024", "url": "https://www.qnap.com/go/security-advisory/qsa-24-17" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-09 du 09 mars 2024", "url": "https://www.qnap.com/go/security-advisory/qsa-24-09" } ] }
CERTFR-2024-AVI-0201
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une injection de code indirecte à distance (XSS), et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | N/A | QuTScloud versions c5.x antérieures à c5.1.5.2651 | ||
Qnap | N/A | Photo Station versions 6.4.x antérieures à 6.4.2 | ||
Qnap | QTS | QTS versions 4.5.x antérieures à 4.5.4.2627 build 20231225 | ||
Qnap | QTS | QTS versions 5.1.x antérieures à 5.1.4.2596 build 20231128 | ||
Qnap | QuTS hero | QuTS hero versions h5.1.x antérieures à h5.1.4.2596 build 20231128 | ||
Qnap | QuTS hero | QuTS hero versions h4.5.x antérieures à h4.5.4.2626 build 20231225 | ||
Qnap | N/A | myQNAPcloud versions 1.0.x antérieures à 1.0.52 |
Title | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.5.2651", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Photo Station versions 6.4.x ant\u00e9rieures \u00e0 6.4.2", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2627 build 20231225", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.4.2596 build 20231128", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.4.2596 build 20231128", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2626 build 20231225", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "myQNAPcloud versions 1.0.x ant\u00e9rieures \u00e0 1.0.52", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-34975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34975" }, { "name": "CVE-2023-47221", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47221" }, { "name": "CVE-2024-21900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21900" }, { "name": "CVE-2024-21901", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21901" }, { "name": "CVE-2024-21899", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21899" }, { "name": "CVE-2023-32969", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32969" }, { "name": "CVE-2023-34980", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34980" } ], "initial_release_date": "2024-03-11T00:00:00", "last_revision_date": "2024-03-11T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0201", "revisions": [ { "description": "Version initiale", "revision_date": "2024-03-11T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une injection de code indirecte \u00e0 distance (XSS), et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-09 du 09 mars 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-09" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-11 du 09 mars 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-11" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-12 du 09 mars 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-12" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-13 du 09 mars 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-13" } ] }
CERTFR-2024-AVI-0118
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Contournement provisoire
S’il n’est pas possible de procéder à l’installation d’une version corrigeant la vulnérabilité, se référer aux mesures de contournement proposées par l’éditeur à la section Mitigation.
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | N/A | QuTScloud versions c5.x antérieures à c5.1.5.2651 | ||
Qnap | QTS | QTS versions 4.4.x antérieures à 4.5.4.2627 build 20231225 | ||
Qnap | QTS | QTS versions 4.3.x antérieures à 4.3.3.2644 build 20240131 | ||
Qnap | QTS | QTS versions 5.x.x antérieures à 5.1.5.2645 build 20240116 | ||
Qnap | QTS | QTS versions 4.3.x postérieures à 4.3.5 et antérieures à 4.3.6.2665 build 20240131 | ||
Qnap | QuTS hero | QuTS hero versions h5.x.x antérieures à h5.1.5.2647 build 20240118 | ||
Qnap | QTS | QTS versions 4.2.x antérieures à 4.2.6 build 20240131 | ||
Qnap | QTS | QTS versions 4.3.4 antérieures à 4.3.4.2675 build 20240131 | ||
Qnap | QuTS hero | QuTS hero versions h4.x antérieures à h4.5.4.2626 build 20231225 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.5.2651", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.4.x ant\u00e9rieures \u00e0 4.5.4.2627 build 20231225", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.3.x ant\u00e9rieures \u00e0 4.3.3.2644 build 20240131", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.x.x ant\u00e9rieures \u00e0 5.1.5.2645 build 20240116", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.3.x post\u00e9rieures \u00e0 4.3.5 et ant\u00e9rieures \u00e0 4.3.6.2665 build 20240131", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.x.x ant\u00e9rieures \u00e0 h5.1.5.2647 build 20240118", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.2.x ant\u00e9rieures \u00e0 4.2.6 build 20240131", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.3.4 ant\u00e9rieures \u00e0 4.3.4.2675 build 20240131", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h4.x ant\u00e9rieures \u00e0 h4.5.4.2626 build 20231225", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\n## Contournement provisoire\n\nS\u2019il n\u2019est pas possible de proc\u00e9der \u00e0 l\u2019installation d\u2019une version\ncorrigeant la vuln\u00e9rabilit\u00e9, se r\u00e9f\u00e9rer aux mesures de contournement\npropos\u00e9es par l\u2019\u00e9diteur \u00e0 la section *Mitigation*.\n", "cves": [ { "name": "CVE-2023-50358", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50358" }, { "name": "CVE-2023-47218", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47218" } ], "initial_release_date": "2024-02-13T00:00:00", "last_revision_date": "2024-02-13T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0118", "revisions": [ { "description": "Version initiale", "revision_date": "2024-02-13T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-57 du 13 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-57" } ] }
CERTFR-2024-AVI-0094
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | QuTS hero | QuTS hero h4.5.x versions antérieures à QuTS hero h4.5.4.2626 build 20231225 | ||
Qnap | N/A | Qsync Central 4.3.x versions antérieures à Qsync Central 4.3.0.11 | ||
Qnap | QTS | QTS 5.1.x versions antérieures à QTS 5.1.5.2645 build 20240116 | ||
Qnap | N/A | QuTScloud c5.x versions antérieures à QuTScloud c5.1.5.2651 | ||
Qnap | QTS | QTS 5.1.x versions antérieures à QTS 5.1.2.2533 build 20230926 | ||
Qnap | QuTS hero | QuTS hero h5.1.x versions antérieures à QuTS hero h5.1.3.2578 build 20231110 | ||
Qnap | QuTS hero | QuTS hero h5.1.x versions antérieures à QuTS hero h5.1.5.2647 build 20240118 | ||
Qnap | N/A | Photo Station 6.4.x versions antérieures à Photo Station 6.4.2 | ||
Qnap | QTS | QTS 5.1.x versions antérieures à QTS 5.1.3.2578 build 20231110 | ||
Qnap | N/A | Qsync Central 4.4.x versions antérieures à Qsync Central 4.4.0.15 | ||
Qnap | QuTS hero | QuTS hero h5.1.x versions antérieures à QuTS hero h5.1.4.2596 build 20231128 | ||
Qnap | QuTS hero | QuTS hero h5.1.x versions antérieures à QuTS hero h5.1.2.2534 build 20230927 | ||
Qnap | QTS | QTS 5.1.x versions antérieures à QTS 5.1.4.2596 build 20231128 | ||
Qnap | QTS | QTS 4.5.x versions antérieures à QTS 4.5.4.2627 build 20231225 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QuTS hero h4.5.x versions ant\u00e9rieures \u00e0 QuTS hero h4.5.4.2626 build 20231225", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qsync Central 4.3.x versions ant\u00e9rieures \u00e0 Qsync Central 4.3.0.11", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS 5.1.x versions ant\u00e9rieures \u00e0 QTS 5.1.5.2645 build 20240116", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTScloud c5.x versions ant\u00e9rieures \u00e0 QuTScloud c5.1.5.2651", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS 5.1.x versions ant\u00e9rieures \u00e0 QTS 5.1.2.2533 build 20230926", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 QuTS hero h5.1.3.2578 build 20231110", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 QuTS hero h5.1.5.2647 build 20240118", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Photo Station 6.4.x versions ant\u00e9rieures \u00e0 Photo Station 6.4.2", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS 5.1.x versions ant\u00e9rieures \u00e0 QTS 5.1.3.2578 build 20231110", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qsync Central 4.4.x versions ant\u00e9rieures \u00e0 Qsync Central 4.4.0.15", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 QuTS hero h5.1.4.2596 build 20231128", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 QuTS hero h5.1.2.2534 build 20230927", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS 5.1.x versions ant\u00e9rieures \u00e0 QTS 5.1.4.2596 build 20231128", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS 4.5.x versions ant\u00e9rieures \u00e0 QTS 4.5.4.2627 build 20231225", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-41276", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41276" }, { "name": "CVE-2023-50359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50359" }, { "name": "CVE-2023-41279", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41279" }, { "name": "CVE-2023-41275", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41275" }, { "name": "CVE-2023-47561", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47561" }, { "name": "CVE-2023-39297", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39297" }, { "name": "CVE-2023-47562", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47562" }, { "name": "CVE-2023-47566", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47566" }, { "name": "CVE-2023-32967", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32967" }, { "name": "CVE-2023-48795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795" }, { "name": "CVE-2023-45036", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45036" }, { "name": "CVE-2023-41278", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41278" }, { "name": "CVE-2023-45035", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45035" }, { "name": "CVE-2023-47564", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47564" }, { "name": "CVE-2023-41292", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41292" }, { "name": "CVE-2023-41273", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41273" }, { "name": "CVE-2023-45028", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45028" }, { "name": "CVE-2023-47568", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47568" }, { "name": "CVE-2023-41283", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41283" }, { "name": "CVE-2023-45025", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45025" }, { "name": "CVE-2023-39302", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39302" }, { "name": "CVE-2023-39303", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39303" }, { "name": "CVE-2023-41277", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41277" }, { "name": "CVE-2023-41281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41281" }, { "name": "CVE-2023-41282", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41282" }, { "name": "CVE-2023-41274", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41274" }, { "name": "CVE-2023-45037", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45037" }, { "name": "CVE-2023-45027", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45027" }, { "name": "CVE-2023-47567", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47567" }, { "name": "CVE-2023-45026", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45026" }, { "name": "CVE-2023-41280", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41280" } ], "initial_release_date": "2024-02-05T00:00:00", "last_revision_date": "2024-02-05T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0094", "revisions": [ { "description": "Version initiale", "revision_date": "2024-02-05T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-30 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-30" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-06 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-06" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-46 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-46" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-08 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-08" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-03 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-03" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-53 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-53" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-33 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-33" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-01 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-01" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-05 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-05" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-04 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-04" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-38 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-38" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-02 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-02" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-07 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-07" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-47 du 03 f\u00e9vrier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-47" } ] }
CERTFR-2024-AVI-0011
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | N/A | QcalAgent versions 1.1.x antérieures à 1.1.8 | ||
Qnap | QTS | QTS versions 5.1.x antérieures à 5.1.4.2596 build 20231128 | ||
Qnap | QuTS hero | QuTS hero versions h5.1.x antérieures à h5.1.4.2596 build 20231128 | ||
Qnap | Video Station | Video Station versions 5.7.x antérieures à 5.7.2 | ||
Qnap | QuMagie | QuMagie versions 2.2.x antérieures à 2.2.1 |
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QcalAgent versions 1.1.x ant\u00e9rieures \u00e0 1.1.8", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.4.2596 build 20231128", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.4.2596 build 20231128", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Video Station versions 5.7.x ant\u00e9rieures \u00e0 5.7.2", "product": { "name": "Video Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuMagie versions 2.2.x ant\u00e9rieures \u00e0 2.2.1", "product": { "name": "QuMagie", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-41288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41288" }, { "name": "CVE-2022-43634", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43634" }, { "name": "CVE-2023-45041", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45041" }, { "name": "CVE-2023-47560", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47560" }, { "name": "CVE-2023-45039", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45039" }, { "name": "CVE-2023-45043", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45043" }, { "name": "CVE-2023-47559", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47559" }, { "name": "CVE-2023-41287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41287" }, { "name": "CVE-2023-39296", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39296" }, { "name": "CVE-2023-45044", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45044" }, { "name": "CVE-2023-39294", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39294" }, { "name": "CVE-2023-45042", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45042" }, { "name": "CVE-2023-47219", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47219" }, { "name": "CVE-2023-41289", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41289" }, { "name": "CVE-2023-45040", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45040" } ], "initial_release_date": "2024-01-08T00:00:00", "last_revision_date": "2024-01-08T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0011", "revisions": [ { "description": "Version initiale", "revision_date": "2024-01-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-32 du 06 janvier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-32" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-23 du 06 janvier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-23" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-54 du 06 janvier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-54" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-34 du 06 janvier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-34" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-27 du 06 janvier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-27" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-22 du 06 janvier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-22" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-64 du 06 janvier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-64" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-55 du 06 janvier 2024", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-55" } ] }
CERTFR-2023-AVI-1011
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | QuTS hero | Qnap QuTS hero h5.0.x versions antérieures à h5.0.1.2515 build 20230907 | ||
Qnap | QTS | Qnap QTS 5.0.x versions antérieures à 5.0.1.2514 build 20230906 | ||
Qnap | QTS | Qnap QTS 4.5.x versions antérieures à 4.5.4.2467 build 20230718 | ||
Qnap | QTS | Qnap QTS 5.1.x versions antérieures à 5.1.3.2578 build 20231110 | ||
Qnap | QVR | Qnap QVR Firmware 4.x versions antérieures à 5.x | ||
Qnap | QuTS hero | Qnap QuTS hero h5.1.x versions antérieures à h5.1.3.2578 build 20231110 | ||
Qnap | QuTS hero | Qnap QuTS hero h4.5.x versions antérieures à h4.5.4.2476 build 20230728 |
Title | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Qnap QuTS hero h5.0.x versions ant\u00e9rieures \u00e0 h5.0.1.2515 build 20230907", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QTS 5.0.x versions ant\u00e9rieures \u00e0 5.0.1.2514 build 20230906", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QTS 4.5.x versions ant\u00e9rieures \u00e0 4.5.4.2467 build 20230718", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QTS 5.1.x versions ant\u00e9rieures \u00e0 5.1.3.2578 build 20231110", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QVR Firmware 4.x versions ant\u00e9rieures \u00e0 5.x", "product": { "name": "QVR", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 h5.1.3.2578 build 20231110", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QuTS hero h4.5.x versions ant\u00e9rieures \u00e0 h4.5.4.2476 build 20230728", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-4091", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4091" }, { "name": "CVE-2023-42669", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42669" }, { "name": "CVE-2023-42670", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42670" }, { "name": "CVE-2023-4154", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4154" }, { "name": "CVE-2023-23372", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23372" }, { "name": "CVE-2023-3961", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3961" }, { "name": "CVE-2023-32975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32975" }, { "name": "CVE-2023-32968", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32968" }, { "name": "CVE-2023-47565", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47565" } ], "initial_release_date": "2023-12-11T00:00:00", "last_revision_date": "2023-12-11T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-1011", "revisions": [ { "description": "Version initiale", "revision_date": "2023-12-11T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une\nex\u00e9cution de code arbitraire et une injection de code indirecte \u00e0\ndistance (XSS).\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-07 du 09 d\u00e9cembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-07" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-40 du 09 d\u00e9cembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-40" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-48 du 09 d\u00e9cembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-48" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-20 du 09 d\u00e9cembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-20" } ] }
CERTFR-2023-AVI-0931
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | QuMagie | Qnap QuMagie versions 2.1.x antérieures à 2.1.4 | ||
Qnap | QTS | Qnap QTS versions 5.0.x antérieures à 5.0.1.2376 build 20230421 | ||
Qnap | N/A | QNap QuTScloud versions c5.x antérieures à c5.1.0.2498 | ||
Qnap | QuTS hero | Qnap QuTS hero versions h5.0.x antérieures à h5.0.1.2376 build 20230421 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Qnap QuMagie versions 2.1.x ant\u00e9rieures \u00e0 2.1.4", "product": { "name": "QuMagie", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QTS versions 5.0.x ant\u00e9rieures \u00e0 5.0.1.2376 build 20230421", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNap QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.0.2498", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QuTS hero versions h5.0.x ant\u00e9rieures \u00e0 h5.0.1.2376 build 20230421", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-23367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23367" }, { "name": "CVE-2023-39295", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39295" }, { "name": "CVE-2023-41284", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41284" }, { "name": "CVE-2023-41285", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41285" } ], "initial_release_date": "2023-11-13T00:00:00", "last_revision_date": "2023-11-13T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0931", "revisions": [ { "description": "Version initiale", "revision_date": "2023-11-13T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-24 du 11 novembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-24" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-50 du 11 novembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-50" } ] }
CERTFR-2023-AVI-0915
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | Music Station | QNAP Music Station versions 5.1.x antérieures à 5.1.16 | ||
Qnap | QuTS hero | QNAP QuTS hero versions h4.5.x antérieures à h4.5.4.2374 build 20230417 | ||
Qnap | QTS | QNAP QTS versions 5.0.x antérieures à 5.0.1.2514 build 20230906 | ||
Qnap | QTS | QNAP QTS versions 4.2.x antérieures à 4.2.6 build 20230621 | ||
Qnap | QTS | QNAP QTS versions 4.3.3.x antérieures à 4.3.3.2420 build 20230621 | ||
Qnap | QTS | QNAP QTS versions 4.5.x antérieures à 4.5.4.2374 build 20230416 | ||
Qnap | N/A | QNAP QuTScloud versions c5.x antérieures à c5.1.0.2498 | ||
Qnap | N/A | QNAP Media Streaming add-on versions 500.0.x antérieures à 500.0.0.11 | ||
Qnap | N/A | QNAP Multimedia Console versions 2.1.x antérieures à 2.1.2 | ||
Qnap | N/A | QNAP Media Streaming add-on versions 500.1.x antérieures à 500.1.1.2 | ||
Qnap | Music Station | QNAP Music Station versions 5.3.x antérieures à 5.3.23 | ||
Qnap | N/A | QNAP Multimedia Console versions 1.4.x antérieures à 1.4.8 | ||
Qnap | QuTS hero | QNAP QuTS hero versions h5.0.x antérieures à h5.0.1.2515 build 20230907 | ||
Qnap | QTS | QNAP QTS versions 5.1.x antérieures à 5.1.1.2491 build 20230815 | ||
Qnap | Music Station | QNAP Music Station versions 4.8.x antérieures à 4.8.11 | ||
Qnap | QuTS hero | QNAP QuTS hero versions h5.1.x antérieures à h5.1.1.2488 build 20230812 | ||
Qnap | QTS | QNAP QTS versions 4.3.6.x antérieures à 4.3.6.2441 build 20230621 | ||
Qnap | QTS | QNAP QTS versions 4.3.4.x antérieures à 4.3.4.2451 build 20230621 |
Title | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QNAP Music Station versions 5.1.x ant\u00e9rieures \u00e0 5.1.16", "product": { "name": "Music Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2374 build 20230417", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP QTS versions 5.0.x ant\u00e9rieures \u00e0 5.0.1.2514 build 20230906", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP QTS versions 4.2.x ant\u00e9rieures \u00e0 4.2.6 build 20230621", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP QTS versions 4.3.3.x ant\u00e9rieures \u00e0 4.3.3.2420 build 20230621", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2374 build 20230416", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.0.2498", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP Media Streaming add-on versions 500.0.x ant\u00e9rieures \u00e0 500.0.0.11", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP Multimedia Console versions 2.1.x ant\u00e9rieures \u00e0 2.1.2", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP Media Streaming add-on versions 500.1.x ant\u00e9rieures \u00e0 500.1.1.2", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP Music Station versions 5.3.x ant\u00e9rieures \u00e0 5.3.23", "product": { "name": "Music Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP Multimedia Console versions 1.4.x ant\u00e9rieures \u00e0 1.4.8", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP QuTS hero versions h5.0.x ant\u00e9rieures \u00e0 h5.0.1.2515 build 20230907", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.1.2491 build 20230815", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP Music Station versions 4.8.x ant\u00e9rieures \u00e0 4.8.11", "product": { "name": "Music Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.1.2488 build 20230812", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP QTS versions 4.3.6.x ant\u00e9rieures \u00e0 4.3.6.2441 build 20230621", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP QTS versions 4.3.4.x ant\u00e9rieures \u00e0 4.3.4.2451 build 20230621", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-39299", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39299" }, { "name": "CVE-2023-39301", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39301" }, { "name": "CVE-2023-23368", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23368" }, { "name": "CVE-2023-23369", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23369" } ], "initial_release_date": "2023-11-06T00:00:00", "last_revision_date": "2023-11-06T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0915", "revisions": [ { "description": "Version initiale", "revision_date": "2023-11-06T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-31 du 04 novembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-31" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-61 du 04 novembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-61" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-51 du 04 novembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-51" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-35 du 04 novembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-35" } ] }
CERTFR-2023-AVI-0846
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | N/A | Container Station versions 5..6.x antérieures à 2.6.7.44 | ||
Qnap | QTS | QTS hero versions h5.0.x antérieures à h5.0.1.2515 build 20230907 | ||
Qnap | QTS | QTS versions 5.1.x antérieures à 5.1.0.2444 build 20230629 | ||
Qnap | QTS | QTS versions 4.5.x antérieures à 4.5.4.2467 build 20230718 | ||
Qnap | QTS | QTS hero versions h5.1.x antérieures à h5.1.0.2424 build 20230609 | ||
Qnap | N/A | QuTScloud versions c5.x antérieures à c5.1.0.2498 | ||
Qnap | QTS | QTS hero versions h4.5.x antérieures à h4.5.4.2476 build 20230728 | ||
Qnap | QTS | QTS versions 5.0.x antérieures à 5.0.1.2425 build 20230609 | ||
Qnap | Video Station | Video Station versions 5.7.x antérieures à 5.7.0 (2023/07/27) |
Title | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Container Station versions 5..6.x ant\u00e9rieures \u00e0 2.6.7.44", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS hero versions h5.0.x ant\u00e9rieures \u00e0 h5.0.1.2515 build 20230907", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.0.2444 build 20230629", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2467 build 20230718", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.0.2424 build 20230609", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.0.2498", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2476 build 20230728", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.0.x ant\u00e9rieures \u00e0 5.0.1.2425 build 20230609", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Video Station versions 5.7.x ant\u00e9rieures \u00e0 5.7.0 (2023/07/27)", "product": { "name": "Video Station", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-34975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34975" }, { "name": "CVE-2023-34977", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34977" }, { "name": "CVE-2023-32976", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32976" }, { "name": "CVE-2023-32973", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32973" }, { "name": "CVE-2023-32970", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32970" }, { "name": "CVE-2023-34976", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34976" }, { "name": "CVE-2023-32974", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32974" } ], "initial_release_date": "2023-10-16T00:00:00", "last_revision_date": "2023-10-16T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0846", "revisions": [ { "description": "Version initiale", "revision_date": "2023-10-16T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-42 du 14 octobre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-42" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-52 du 14 octobre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-52" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-41 du 14 octobre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-41" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-44 du 14 octobre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-44" } ] }
CERTFR-2023-AVI-0815
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | N/A | QVPN Windows 2.1.x versions antérieures à 2.1.0.0518 | ||
Qnap | QuTS hero | QuTS hero h5.0.x versions antérieures à h5.0.1.2515 build 20230907 | ||
Qnap | N/A | QuTScloud c5.x versions antérieures à c5.1.0.2498 | ||
Qnap | QTS | QTS 5.0.x versions antérieures à 5.0.1.2425 build 20230609 | ||
Qnap | QTS | QTS 4.5.x versions antérieures à 4.5.4.2467 build 20230718 | ||
Qnap | QuTS hero | QuTS hero h5.1.x versions antérieures à h5.1.0.2424 build 20230609 | ||
Qnap | QuTS hero | QuTS hero h4.5.x versions antérieures à h4.5.4.2476 build 20230728 | ||
Qnap | Music Station | Qnap Music Station versions 5.3.x antérieures à 5.3.22 | ||
Qnap | N/A | QVPN Windows 2.2.x versions antérieures à 2.2.0.0823 | ||
Qnap | QTS | QTS 5.1.x versions antérieures à 5.1.0.2444 build 20230629 |
Title | Publication Time | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QVPN Windows 2.1.x versions ant\u00e9rieures \u00e0 2.1.0.0518", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero h5.0.x versions ant\u00e9rieures \u00e0 h5.0.1.2515 build 20230907", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTScloud c5.x versions ant\u00e9rieures \u00e0 c5.1.0.2498", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS 5.0.x versions ant\u00e9rieures \u00e0 5.0.1.2425 build 20230609", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS 4.5.x versions ant\u00e9rieures \u00e0 4.5.4.2467 build 20230718", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 h5.1.0.2424 build 20230609", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero h4.5.x versions ant\u00e9rieures \u00e0 h4.5.4.2476 build 20230728", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap Music Station versions 5.3.x ant\u00e9rieures \u00e0 5.3.22", "product": { "name": "Music Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QVPN Windows 2.2.x versions ant\u00e9rieures \u00e0 2.2.0.0823", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS 5.1.x versions ant\u00e9rieures \u00e0 5.1.0.2444 build 20230629", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-20052", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20052" }, { "name": "CVE-2023-32972", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32972" }, { "name": "CVE-2023-23366", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23366" }, { "name": "CVE-2023-23365", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23365" }, { "name": "CVE-2023-23370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23370" }, { "name": "CVE-2023-32971", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32971" }, { "name": "CVE-2023-20032", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20032" }, { "name": "CVE-2023-23371", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23371" } ], "initial_release_date": "2023-10-09T00:00:00", "last_revision_date": "2023-10-09T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0815", "revisions": [ { "description": "Version initiale", "revision_date": "2023-10-09T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-26 du 07 octobre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-26" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-39 du 07 octobre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-39" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-36 du 07 octobre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-36" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-28 du 07 octobre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-28" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-37 du 07 octobre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-37" } ] }
CERTFR-2023-AVI-0771
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | QuTS hero | QuTS hero versions 5.1.0.x antérieures à h5.1.0.2392 build 20230508 | ||
Qnap | QTS | QTS versions 5.1.0.x antérieures à 5.1.0.2348 build 2023032 | ||
Qnap | N/A | QuTScloud versions c5.0.1.x antérieures à c5.0.1.2374 | ||
Qnap | N/A | Multimedia Console versions 2.1.x antérieures à 2.1.1 (2023/03/29) | ||
Qnap | N/A | Multimedia Console versions 1.4.x antérieures à 1.4.7 (2023/03/20) |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QuTS hero versions 5.1.0.x ant\u00e9rieures \u00e0 h5.1.0.2392 build 20230508", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.1.0.x ant\u00e9rieures \u00e0 5.1.0.2348 build 2023032", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTScloud versions c5.0.1.x ant\u00e9rieures \u00e0 c5.0.1.2374", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Multimedia Console versions 2.1.x ant\u00e9rieures \u00e0 2.1.1 (2023/03/29)", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Multimedia Console versions 1.4.x ant\u00e9rieures \u00e0 1.4.7 (2023/03/20)", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-36760", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36760" }, { "name": "CVE-2006-20001", "url": "https://www.cve.org/CVERecord?id=CVE-2006-20001" }, { "name": "CVE-2023-23364", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23364" }, { "name": "CVE-2022-37436", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37436" }, { "name": "CVE-2023-23363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23363" } ], "initial_release_date": "2023-09-22T00:00:00", "last_revision_date": "2023-09-22T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0771", "revisions": [ { "description": "Version initiale", "revision_date": "2023-09-22T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un probl\u00e8me\nde s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-25 du 22 septembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-25" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-12 du 22 septembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-12" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-29 du 22 septembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-29" } ] }
CERTFR-2023-AVI-0758
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | QuTS hero | QuTS hero versions antérieures à h5.0.1.2376 build 20230421 | ||
Qnap | QuTS hero | QuTS hero versions antérieures à h4.5.4.2374 build 20230417 | ||
Qnap | QTS | QTS versions antérieures à 4.5.4.2374 build 20230416 | ||
Qnap | QTS | QTS versions antérieures à 5.0.1.2376 build 20230421 | ||
Qnap | N/A | QuTScloud versions antérieures à c5.0.1.2374 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QuTS hero versions ant\u00e9rieures \u00e0 h5.0.1.2376 build 20230421", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions ant\u00e9rieures \u00e0 h4.5.4.2374 build 20230417", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions ant\u00e9rieures \u00e0 4.5.4.2374 build 20230416", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions ant\u00e9rieures \u00e0 5.0.1.2376 build 20230421", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTScloud versions ant\u00e9rieures \u00e0 c5.0.1.2374", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-23362", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23362" }, { "name": "CVE-2023-23359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23359" }, { "name": "CVE-2023-23361", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23361" }, { "name": "CVE-2023-23358", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23358" }, { "name": "CVE-2023-23360", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23360" } ], "initial_release_date": "2023-09-18T00:00:00", "last_revision_date": "2023-09-18T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0758", "revisions": [ { "description": "Version initiale", "revision_date": "2023-09-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et\nune ex\u00e9cution de code arbitraire \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-21 du 16 septembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-21" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-18 du 16 septembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-18" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-19 du 16 septembre 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-19" } ] }
CERTFR-2023-AVI-0685
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Qnap QTS et QuTS hero. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | QuTS hero | QuTS hero versions h4.5.4.x antérieures à h4.5.4.2476 build 20230728 | ||
Qnap | QTS | QTS versions 5.1.0.x antérieures à 5.1.0.2444 build 20230629 | ||
Qnap | QTS | QTS versions 5.0.1.x antérieures à 5.0.1.2425 build 20230609 | ||
Qnap | QTS | QTS versions 4.5.4.x antérieures à 4.5.4.2467 build 20230718 | ||
Qnap | QuTS hero | QuTS hero versions h5.1.0.x antérieures à h5.1.0.2424 build 20230609 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QuTS hero versions h4.5.4.x ant\u00e9rieures \u00e0 h4.5.4.2476 build 20230728", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.1.0.x ant\u00e9rieures \u00e0 5.1.0.2444 build 20230629", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.0.1.x ant\u00e9rieures \u00e0 5.0.1.2425 build 20230609", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.5.4.x ant\u00e9rieures \u00e0 4.5.4.2467 build 20230718", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.1.0.x ant\u00e9rieures \u00e0 h5.1.0.2424 build 20230609", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-34973", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34973" }, { "name": "CVE-2023-34972", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34972" }, { "name": "CVE-2023-34971", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34971" } ], "initial_release_date": "2023-08-25T00:00:00", "last_revision_date": "2023-08-25T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0685", "revisions": [ { "description": "Version initiale", "revision_date": "2023-08-25T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Qnap QTS et QuTS\nhero. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Qnap QTS et QuTS hero", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-59 du 25 ao\u00fbt 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-59" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-58 du 25 ao\u00fbt 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-58" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-60 du 25 ao\u00fbt 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-60" } ] }
CERTFR-2023-AVI-0602
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer un déni de service à distance et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | QVR | QVR Pro Appliance versions antérieures à 2.3.1.0476 | ||
Qnap | QTS | QTS versions antérieures à 4.5.4.2280 build 20230112 | ||
Qnap | QuTS hero | QuTS hero versions antérieures à h4.5.4.2374 build 20230417 | ||
Qnap | N/A | QVPN Device Client pour Windows versions antérieures à 2.0.0.1316 | ||
Qnap | N/A | QuTScloud versions antérieures à c5.0.1.2374 build 20230419 | ||
Qnap | QTS | QTS versions antérieures à 5.0.1.2277 build 20230112 | ||
Qnap | QuTS hero | QuTS hero versions antérieures à h5.0.1.2277 build 20230112 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QVR Pro Appliance versions ant\u00e9rieures \u00e0 2.3.1.0476", "product": { "name": "QVR", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions ant\u00e9rieures \u00e0 4.5.4.2280 build 20230112", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions ant\u00e9rieures \u00e0 h4.5.4.2374 build 20230417", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QVPN Device Client pour Windows versions ant\u00e9rieures \u00e0 2.0.0.1316", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTScloud versions ant\u00e9rieures \u00e0 c5.0.1.2374 build 20230419", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions ant\u00e9rieures \u00e0 5.0.1.2277 build 20230112", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions ant\u00e9rieures \u00e0 h5.0.1.2277 build 20230112", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-27600", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27600" }, { "name": "CVE-2022-27595", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27595" } ], "initial_release_date": "2023-07-28T00:00:00", "last_revision_date": "2023-07-28T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0602", "revisions": [ { "description": "Version initiale", "revision_date": "2023-07-28T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un d\u00e9ni de service \u00e0 distance et une ex\u00e9cution de code\narbitraire.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-04 du 28 juillet 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-04" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-09 du 28 juillet 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-09" } ] }
CERTFR-2023-AVI-0271
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QTS versions 5.0.x ant\u00e9rieures \u00e0 5.0.1.2346 build 20230322", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero h5.0.x ant\u00e9rieures \u00e0 h5.0.1.2348 build 20230324", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-4304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2022-3437", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3437" }, { "name": "CVE-2023-22809", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22809" }, { "name": "CVE-2022-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450" }, { "name": "CVE-2022-42898", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42898" }, { "name": "CVE-2022-3592", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3592" }, { "name": "CVE-2022-27597", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27597" }, { "name": "CVE-2022-27598", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27598" }, { "name": "CVE-2023-23355", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23355" } ], "initial_release_date": "2023-03-30T00:00:00", "last_revision_date": "2023-03-30T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0271", "revisions": [ { "description": "Version initiale", "revision_date": "2023-03-30T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits \u003cspan\nclass=\"textit\"\u003eQnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et un contournement de la politique de\ns\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-06 du 30 mars 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-06" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-10 du 30 mars 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-10" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-03 du 30 mars 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-03" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-15 du 30 mars 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-15" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-11 du 30 mars 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-11" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-02 du 30 mars 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-02" } ] }
CERTFR-2023-AVI-0071
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans QNAP QTS et QuTS hero. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QTS versions 5.0.1.x ant\u00e9rieures \u00e0 5.0.1.2234 build 20221201", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.0.1.x ant\u00e9rieures \u00e0 h5.0.1.2248 build 20221215", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-27596", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27596" } ], "initial_release_date": "2023-01-30T00:00:00", "last_revision_date": "2023-01-30T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0071", "revisions": [ { "description": "Version initiale", "revision_date": "2023-01-30T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans QNAP QTS et QuTS hero. Elle\npermet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans QNAP QTS et QuTS hero", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-23-01 du 30 janvier 2023", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-01" } ] }
CERTFR-2022-AVI-742
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Qnap QTS. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QTS versions 5.x ant\u00e9rieures \u00e0 5.0.0.2131 build 20220815", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions ant\u00e9rieures \u00e0 4.5.4.2125 build 20220810", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero h5.0.x et h4.5.x", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTScloud c5.0.1", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-32746", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32746" }, { "name": "CVE-2022-30522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30522" }, { "name": "CVE-2022-32742", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32742" }, { "name": "CVE-2022-32745", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32745" }, { "name": "CVE-2022-2031", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2031" }, { "name": "CVE-2022-30556", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30556" }, { "name": "CVE-2022-28615", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28615" }, { "name": "CVE-2022-32744", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32744" }, { "name": "CVE-2022-31813", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31813" }, { "name": "CVE-2022-29404", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29404" }, { "name": "CVE-2022-26377", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26377" }, { "name": "CVE-2022-28330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28330" }, { "name": "CVE-2022-28614", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28614" } ], "initial_release_date": "2022-08-16T00:00:00", "last_revision_date": "2022-08-16T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-742", "revisions": [ { "description": "Version initiale", "revision_date": "2022-08-16T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Qnap QTS. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Qnap QTS", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-23 du 16 ao\u00fbt 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-23" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-22 du 16 ao\u00fbt 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-22" } ] }
CERTFR-2022-AVI-503
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans QNAP Proxy Server. Elle permet à un attaquant de provoquer une injection de requêtes illégitimes par rebond (CSRF).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | QTS | QTS versions 4.5.x et QTS versions 5.0.x avec Proxy Server versions antérieures à 1.4.2 (2021/12/30) | ||
Qnap | N/A | QuTScloud versions c4.5.x et QuTScloud versions c5.0.x avec Proxy Server versions antérieures à 1.4.2 (2021/12/30) | ||
Qnap | QuTS hero | QuTS hero versions h5.0.x avec Proxy Server versions antérieures à 1.4.3 (2022/01/18) |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QTS versions 4.5.x et QTS versions 5.0.x avec Proxy Server versions ant\u00e9rieures \u00e0 1.4.2 (2021/12/30)", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTScloud versions c4.5.x et QuTScloud versions c5.0.x avec Proxy Server versions ant\u00e9rieures \u00e0 1.4.2 (2021/12/30)", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.0.x avec Proxy Server versions ant\u00e9rieures \u00e0 1.4.3 (2022/01/18)", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-34360", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34360" } ], "initial_release_date": "2022-05-27T00:00:00", "last_revision_date": "2022-05-27T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-503", "revisions": [ { "description": "Version initiale", "revision_date": "2022-05-27T00:00:00.000000" } ], "risks": [ { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans QNAP Proxy Server. Elle permet \u00e0\nun attaquant de provoquer une injection de requ\u00eates ill\u00e9gitimes par\nrebond (CSRF).\n", "title": "Vuln\u00e9rabilit\u00e9 dans QNAP Proxy Server", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-22-18 du 26 mai 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-18" } ] }
CERTFR-2022-AVI-421
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | N/A | Qnap Photo Station versions antérieures à 6.0.20 (2022/02/15) | ||
Qnap | N/A | Qnap Photo Station versions antérieures à 5.4.13 (2022/02/11) | ||
Qnap | N/A | Qnap Photo Station versions antérieures à 5.7.16 (2022/02/11) | ||
Qnap | Video Station | Qnap Video Station versions antérieures à 5.3.13 | ||
Qnap | QTS | Qnap QTS versions antérieures à 4.5.4.1991 build 20220329 | ||
Qnap | QTS | Qnap QTS versions antérieures à 4.3.4.1976 build 20220303 | ||
Qnap | N/A | Qnap QuTScloud versions antérieures à c5.0.1.1998 | ||
Qnap | QTS | Qnap QTS versions antérieures à 4.2.6 build 20220304 | ||
Qnap | QTS | Qnap QTS versions antérieures à 4.3.3.1945 build 20220303 | ||
Qnap | QTS | Qnap QTS versions antérieures à 5.0.0.1986 build 20220324 | ||
Qnap | Video Station | Qnap Video Station versions antérieures à 5.5.9 | ||
Qnap | QTS | Qnap QTS versions antérieures à 4.3.6.1965 build 20220302 | ||
Qnap | QVR | Qnap QVR versions antérieures à 5.1.6 build 20220401 | ||
Qnap | Video Station | Qnap Video Station versions antérieures à 5.1.8 | ||
Qnap | QuTS hero | Qnap QuTS hero versions antérieures à h5.0.0.1986 build 20220324 | ||
Qnap | QuTS hero | Qnap QuTS hero versions antérieures à h4.5.4.1971 build 20220310 |
Title | Publication Time | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Qnap Photo Station versions ant\u00e9rieures \u00e0 6.0.20 (2022/02/15)", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap Photo Station versions ant\u00e9rieures \u00e0 5.4.13 (2022/02/11)", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap Photo Station versions ant\u00e9rieures \u00e0 5.7.16 (2022/02/11)", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap Video Station versions ant\u00e9rieures \u00e0 5.3.13", "product": { "name": "Video Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QTS versions ant\u00e9rieures \u00e0 4.5.4.1991 build 20220329", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QTS versions ant\u00e9rieures \u00e0 4.3.4.1976 build 20220303", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QuTScloud versions ant\u00e9rieures \u00e0 c5.0.1.1998", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QTS versions ant\u00e9rieures \u00e0 4.2.6 build 20220304", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QTS versions ant\u00e9rieures \u00e0 4.3.3.1945 build 20220303", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QTS versions ant\u00e9rieures \u00e0 5.0.0.1986 build 20220324", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap Video Station versions ant\u00e9rieures \u00e0 5.5.9", "product": { "name": "Video Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QTS versions ant\u00e9rieures \u00e0 4.3.6.1965 build 20220302", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QVR versions ant\u00e9rieures \u00e0 5.1.6 build 20220401", "product": { "name": "QVR", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap Video Station versions ant\u00e9rieures \u00e0 5.1.8", "product": { "name": "Video Station", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QuTS hero versions ant\u00e9rieures \u00e0 h5.0.0.1986 build 20220324", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "Qnap QuTS hero versions ant\u00e9rieures \u00e0 h4.5.4.1971 build 20220310", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-44056", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44056" }, { "name": "CVE-2022-44057", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44057" }, { "name": "CVE-2022-44053", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44053" }, { "name": "CVE-2022-44052", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44052" }, { "name": "CVE-2022-44054", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44054" }, { "name": "CVE-2022-27588", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27588" }, { "name": "CVE-2022-44055", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44055" }, { "name": "CVE-2022-38693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38693" }, { "name": "CVE-2022-44051", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44051" } ], "initial_release_date": "2022-05-06T00:00:00", "last_revision_date": "2022-05-06T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-421", "revisions": [ { "description": "Version initiale", "revision_date": "2022-05-06T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-13 du 6 mai 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-13" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-14 du 6 mai 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-14" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-07 du 6 mai 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-07" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-15 du 6 mai 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-15" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-16 du 6 mai 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-16" } ] }
CERTFR-2022-AVI-324
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits QNAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | QTS | QTS versions 4.3.6.x antérieures à 4.3.6.1965 build 20220302 | ||
Qnap | QuTS hero | QuTS hero versions h5.x antérieures à h5.0.0.1986 build 20220324 | ||
Qnap | QuTS hero | QuTS hero versions h4.x antérieures à h4.5.4.1951 build 20220218 | ||
Qnap | QTS | QTS versions 4.3.4.x antérieures à 4.3.4.1976 build 20220303 | ||
Qnap | N/A | QuTScloud versions c5.0.x antérieures à c5.0.1.1949 (ne corrige pas CVE-2022-0847) | ||
Qnap | QTS | QTS versions 4.3.3.x antérieures à 4.3.3.1945 build 20220303 | ||
Qnap | QTS | QTS versions 4.5.4.x antérieures à 4.5.4.1931 build 20220128 | ||
Qnap | QTS | QTS versions 5.0.x antérieures à 5.0.0.1986 build 20220324 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QTS versions 4.3.6.x ant\u00e9rieures \u00e0 4.3.6.1965 build 20220302", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h5.x ant\u00e9rieures \u00e0 h5.0.0.1986 build 20220324", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions h4.x ant\u00e9rieures \u00e0 h4.5.4.1951 build 20220218", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.3.4.x ant\u00e9rieures \u00e0 4.3.4.1976 build 20220303", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTScloud versions c5.0.x ant\u00e9rieures \u00e0 c5.0.1.1949 (ne corrige pas CVE-2022-0847)", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.3.3.x ant\u00e9rieures \u00e0 4.3.3.1945 build 20220303", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 4.5.4.x ant\u00e9rieures \u00e0 4.5.4.1931 build 20220128", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions 5.0.x ant\u00e9rieures \u00e0 5.0.0.1986 build 20220324", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-44141", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44141" }, { "name": "CVE-2022-0847", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0847" }, { "name": "CVE-2022-0336", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0336" }, { "name": "CVE-2021-44142", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44142" } ], "initial_release_date": "2022-04-08T00:00:00", "last_revision_date": "2022-04-08T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-324", "revisions": [ { "description": "Version initiale", "revision_date": "2022-04-08T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits QNAP.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits QNAP", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 QNAP QSA-22-03 du 19 mars 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-03" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 QNAP QSA-22-05 du 08 avril 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-05" } ] }
CERTFR-2022-AVI-186
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Qnap Proxy Server. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QTS 4.5.x: Proxy Server versions ant\u00e9rieures \u00e0 1.4.2", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-34361", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34361" }, { "name": "CVE-2021-34359", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34359" } ], "initial_release_date": "2022-02-25T00:00:00", "last_revision_date": "2022-02-25T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-186", "revisions": [ { "description": "Version initiale", "revision_date": "2022-02-25T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Qnap Proxy Server.\nElles permettent \u00e0 un attaquant de provoquer une injection de code\nindirecte \u00e0 distance (XSS).\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Qnap Proxy Server", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-04 du 25 f\u00e9vrier 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-04" } ] }
CERTFR-2022-AVI-033
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits QNAP. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | QTS | QTS 4.5.x versions antérieures à 4.5.4.1892 build 20211223 | ||
Qnap | N/A | QcalAgent versions antérieures à 1.1.7 | ||
Qnap | QVR | QVR Pro versions antérieures à 2.1.3.0 du 06/12/2021 | ||
Qnap | QTS | QTS 5.0.x versions antérieures à 5.0.0.1891 build 20211221 | ||
Qnap | QVR | QVR Guard versions antérieures à 2.1.3.0 du 06/12/2021 | ||
Qnap | QuTS hero | QuTS hero versions antérieures à h5.0.0.1892 build 20211222 | ||
Qnap | QVR | QVR Elite versions antérieures à 2.1.4.0 du 06/12/2021 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QTS 4.5.x versions ant\u00e9rieures \u00e0 4.5.4.1892 build 20211223", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QcalAgent versions ant\u00e9rieures \u00e0 1.1.7", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QVR Pro versions ant\u00e9rieures \u00e0 2.1.3.0 du 06/12/2021", "product": { "name": "QVR", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS 5.0.x versions ant\u00e9rieures \u00e0 5.0.0.1891 build 20211221", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QVR Guard versions ant\u00e9rieures \u00e0 2.1.3.0 du 06/12/2021", "product": { "name": "QVR", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions ant\u00e9rieures \u00e0 h5.0.0.1892 build 20211222", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QVR Elite versions ant\u00e9rieures \u00e0 2.1.4.0 du 06/12/2021", "product": { "name": "QVR", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-38690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38690" }, { "name": "CVE-2021-38677", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38677" }, { "name": "CVE-2021-38691", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38691" }, { "name": "CVE-2021-38678", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38678" }, { "name": "CVE-2021-38692", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38692" }, { "name": "CVE-2021-38689", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38689" }, { "name": "CVE-2021-38682", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38682" } ], "initial_release_date": "2022-01-13T00:00:00", "last_revision_date": "2022-01-13T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-033", "revisions": [ { "description": "Version initiale", "revision_date": "2022-01-13T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits QNAP.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance et une injection de code indirecte \u00e0 distance\n(XSS).\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits QNAP", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-57 du 13 janvier 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-57" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-60 du 13 janvier 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-60" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-59 du 13 janvier 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-59" } ] }
CERTFR-2022-AVI-009
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits QNAP. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Qnap | QuTS hero | QuTS hero versions antérieures à h4.5.4.1771 du 25/08/2021 | ||
Qnap | QTS | QTS versions antérieures à 4.5.4.1787 du 10/09/2021 | ||
Qnap | N/A | QuTScloud versions antérieures à c4.5.7.1864 | ||
Qnap | N/A | QNAP NAS utilisant QVPN Service versions antérieures à 3.0.760 du 17/12/2021 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QuTS hero versions ant\u00e9rieures \u00e0 h4.5.4.1771 du 25/08/2021", "product": { "name": "QuTS hero", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QTS versions ant\u00e9rieures \u00e0 4.5.4.1787 du 10/09/2021", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTScloud versions ant\u00e9rieures \u00e0 c4.5.7.1864", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QNAP NAS utilisant QVPN Service versions ant\u00e9rieures \u00e0 3.0.760 du 17/12/2021", "product": { "name": "N/A", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-38674", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38674" } ], "initial_release_date": "2022-01-07T00:00:00", "last_revision_date": "2022-01-07T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-009", "revisions": [ { "description": "Version initiale", "revision_date": "2022-01-07T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits QNAP.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance et une injection de code indirecte \u00e0 distance\n(XSS).\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits QNAP", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-63 du 7 janvier 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-63" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-61 du 7 janvier 2022", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-61" } ] }
CERTFR-2021-AVI-987
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans QNAP QTS. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "QTS versions ant\u00e9rieures \u00e0 4.5.4.1787 build 20210910", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTS hero versions ant\u00e9rieures \u00e0 h4.5.4.1771 build 20210825", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } }, { "description": "QuTScloud versions ant\u00e9rieures \u00e0 c4.5.7.1864", "product": { "name": "QTS", "vendor": { "name": "Qnap", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-34347", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34347" } ], "initial_release_date": "2021-12-30T00:00:00", "last_revision_date": "2021-12-30T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-987", "revisions": [ { "description": "Version initiale", "revision_date": "2021-12-30T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans QNAP QTS. Elle permet \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Vuln\u00e9rabilit\u00e9 dans QNAP QTS", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-53 du 30 d\u00e9cembre 2021", "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-53" } ] }