Refine your search

51 vulnerabilities found for QTS by Qnap

CERTFR-2025-AVI-0486
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Qnap QTS QTS versions 5.2.x antérieures à 5.2.4.3079 build 20250321
Qnap QuRouter QuRouter versions 2.4.x et 2.5.x antérieures à 2.5.0.140
Qnap QuTS hero QuTS hero versions h5.2.x antérieures à h5.2.4.3079 build 20250321
Qnap License Center License Center versions 1.9.x antérieures à 1.9.49
Qnap File Station File Station 5 versions 5.5.x antérieures à 5.5.6.4847
Qnap Qsync Qsync Central versions 4.5.x antérieures à 4.5.0.6
Qnap QES QES versions 2.2.x antérieures à 2.2.1 build 20250304
References
Bulletin de sécurité Qnap QSA-25-17 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-11 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-14 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-10 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-09 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-15 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-13 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-16 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-12 2025-06-07 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QTS versions 5.2.x ant\u00e9rieures \u00e0 5.2.4.3079 build 20250321",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuRouter versions 2.4.x et 2.5.x ant\u00e9rieures \u00e0 2.5.0.140",
      "product": {
        "name": "QuRouter",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.2.x ant\u00e9rieures \u00e0 h5.2.4.3079 build 20250321",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "License Center versions 1.9.x ant\u00e9rieures \u00e0 1.9.49",
      "product": {
        "name": "License Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "File Station 5 versions 5.5.x ant\u00e9rieures \u00e0 5.5.6.4847",
      "product": {
        "name": "File Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qsync Central versions 4.5.x ant\u00e9rieures \u00e0 4.5.0.6",
      "product": {
        "name": "Qsync",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QES versions 2.2.x ant\u00e9rieures \u00e0 2.2.1 build 20250304",
      "product": {
        "name": "QES",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-26465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
    },
    {
      "name": "CVE-2025-33031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33031"
    },
    {
      "name": "CVE-2024-56805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56805"
    },
    {
      "name": "CVE-2024-50406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50406"
    },
    {
      "name": "CVE-2025-22482",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22482"
    },
    {
      "name": "CVE-2025-26466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26466"
    },
    {
      "name": "CVE-2025-29872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29872"
    },
    {
      "name": "CVE-2025-29892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29892"
    },
    {
      "name": "CVE-2025-22490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22490"
    },
    {
      "name": "CVE-2025-29873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29873"
    },
    {
      "name": "CVE-2025-29884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29884"
    },
    {
      "name": "CVE-2025-33035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33035"
    },
    {
      "name": "CVE-2025-29876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29876"
    },
    {
      "name": "CVE-2025-22485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22485"
    },
    {
      "name": "CVE-2024-13087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13087"
    },
    {
      "name": "CVE-2025-22484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22484"
    },
    {
      "name": "CVE-2023-28370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28370"
    },
    {
      "name": "CVE-2025-29877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29877"
    },
    {
      "name": "CVE-2025-29883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29883"
    },
    {
      "name": "CVE-2025-30279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30279"
    },
    {
      "name": "CVE-2025-22486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22486"
    },
    {
      "name": "CVE-2025-29871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29871"
    },
    {
      "name": "CVE-2024-6387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
    },
    {
      "name": "CVE-2025-22481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22481"
    },
    {
      "name": "CVE-2024-13088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13088"
    },
    {
      "name": "CVE-2025-29885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29885"
    }
  ],
  "initial_release_date": "2025-06-10T00:00:00",
  "last_revision_date": "2025-06-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0486",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Injection SQL (SQLi)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-17",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-17"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-11",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-11"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-14",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-14"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-10",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-10"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-09",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-09"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-15",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-15"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-13",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-13"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-16",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-16"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-12",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-12"
    }
  ]
}

CERTFR-2025-AVI-0188
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Qnap HBS 3 Hybrid Backup Sync HBS 3 Hybrid Backup Sync versions 25.1.x antérieures à 25.1.4.952
Qnap QuTS hero QuTS hero versions h5.1.x antérieures à h5.1.9.2954 build 20241120
Qnap QuLog Center QuLog Center versions 1.8.x antérieures à 1.8.0.888
Qnap File Station File Station versions 5.5.x antérieures à 5.5.6.4741
Qnap QTS QTS versions 5.1.x antérieures à 5.1.9.2954 build 20241120
Qnap Helpdesk Helpdesk versions 3.3.x antérieurs à 3.3.3
Qnap QuRouter QuRouter versions 2.4.x antérieures à 2.4.6.028
Qnap QVPN QVPN Device Client versions 2.2.x antérieures à 2.2.5 pour Mac
Qnap QTS QTS versions 5.2.x antérieures à 5.2.3.3006 build 20250108
Qnap QTS QTS versions 4.5.x antérieures à 4.5.4.2957 build 20241119
Qnap QuTS hero QuTS hero versions h4.5.x antérieures à h4.5.4.2956 build 20241119
Qnap QuLog Center QuLog Center versions 1.7.x antérieures à 1.7.0.829
Qnap Qsync Qsync Client versions 5.1.x antérieures à 5.1.3 pour Mac
Qnap QuTS hero QuTS hero versions h5.2.x antérieures à h5.2.3.3006 build 20250108
Qnap Qfinder Qfinder Pro Mac versions 7.11.x antérieures à 7.11.1
References
Bulletin de sécurité Qnap QSA-25-03 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-24-55 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-24-52 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-25-06 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-24-53 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-25-07 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-25-05 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-25-01 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-24-54 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-24-51 2025-03-08 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "HBS 3 Hybrid Backup Sync versions 25.1.x ant\u00e9rieures \u00e0 25.1.4.952",
      "product": {
        "name": "HBS 3 Hybrid Backup Sync",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.9.2954 build 20241120",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuLog Center versions 1.8.x ant\u00e9rieures \u00e0 1.8.0.888",
      "product": {
        "name": "QuLog Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "File Station versions 5.5.x ant\u00e9rieures \u00e0 5.5.6.4741",
      "product": {
        "name": "File Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.9.2954 build 20241120",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Helpdesk versions 3.3.x ant\u00e9rieurs \u00e0 3.3.3",
      "product": {
        "name": "Helpdesk",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuRouter versions 2.4.x ant\u00e9rieures \u00e0 2.4.6.028",
      "product": {
        "name": "QuRouter",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QVPN Device Client versions 2.2.x ant\u00e9rieures \u00e0 2.2.5 pour Mac",
      "product": {
        "name": "QVPN",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.2.x ant\u00e9rieures \u00e0 5.2.3.3006 build 20250108",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2957 build 20241119",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2956 build 20241119",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuLog Center versions 1.7.x ant\u00e9rieures \u00e0 1.7.0.829",
      "product": {
        "name": "QuLog Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qsync Client versions 5.1.x ant\u00e9rieures \u00e0 5.1.3 pour Mac",
      "product": {
        "name": "Qsync",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.2.x ant\u00e9rieures \u00e0 h5.2.3.3006 build 20250108",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qfinder Pro Mac versions 7.11.x ant\u00e9rieures \u00e0 7.11.1",
      "product": {
        "name": "Qfinder",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-53695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53695"
    },
    {
      "name": "CVE-2024-50390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50390"
    },
    {
      "name": "CVE-2024-53700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53700"
    },
    {
      "name": "CVE-2024-53696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53696"
    },
    {
      "name": "CVE-2024-53698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53698"
    },
    {
      "name": "CVE-2024-53693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53693"
    },
    {
      "name": "CVE-2024-53694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53694"
    },
    {
      "name": "CVE-2024-53697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53697"
    },
    {
      "name": "CVE-2024-48864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48864"
    },
    {
      "name": "CVE-2024-50394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50394"
    },
    {
      "name": "CVE-2024-13086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13086"
    },
    {
      "name": "CVE-2024-53699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53699"
    },
    {
      "name": "CVE-2024-53692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53692"
    },
    {
      "name": "CVE-2024-50405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50405"
    },
    {
      "name": "CVE-2024-38638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38638"
    }
  ],
  "initial_release_date": "2025-03-10T00:00:00",
  "last_revision_date": "2025-03-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0188",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-03",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-03"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-55",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-55"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-52",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-52"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-06",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-06"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-53",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-53"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-07",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-07"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-05",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-05"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-01",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-01"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-54",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-54"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-51",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-51"
    }
  ]
}

CERTFR-2024-AVI-1052
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Qnap QuTS hero QuTS hero versions h5.2.x antérieures à h5.2.2.2952 build 20241116
Qnap QuTS hero QuTS hero versions h5.1.x antérieures à h5.1.9.2954 build 20241120
Qnap QTS QTS versions 5.1.x antérieures à 5.1.9.2954 build 20241120
Qnap License Center License Center versions 1.9.x antérieures à 1.9.43
Qnap QTS QTS versions 5.2.x antérieures à 5.2.2.2950 build 20241114
Qnap Qsync Central Qsync Central versions 4.4.x antérieures à 4.4.0.16_20240819 ( 2024/08/19 )
References
Bulletin de sécurité Qnap QSA-24-50 2024-12-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-48 2024-12-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-49 2024-12-07 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QuTS hero versions h5.2.x ant\u00e9rieures \u00e0 h5.2.2.2952 build 20241116",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.9.2954 build 20241120",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.9.2954 build 20241120",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "License Center versions 1.9.x ant\u00e9rieures \u00e0 1.9.43",
      "product": {
        "name": "License Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.2.x ant\u00e9rieures \u00e0 5.2.2.2950 build 20241114",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qsync Central versions 4.4.x ant\u00e9rieures \u00e0 4.4.0.16_20240819 ( 2024/08/19 )",
      "product": {
        "name": "Qsync Central",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-50404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50404"
    },
    {
      "name": "CVE-2024-50403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50403"
    },
    {
      "name": "CVE-2024-50402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50402"
    },
    {
      "name": "CVE-2024-48866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48866"
    },
    {
      "name": "CVE-2024-48867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48867"
    },
    {
      "name": "CVE-2024-48863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48863"
    },
    {
      "name": "CVE-2024-48868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48868"
    },
    {
      "name": "CVE-2024-48859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48859"
    },
    {
      "name": "CVE-2024-50393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50393"
    },
    {
      "name": "CVE-2024-48865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48865"
    }
  ],
  "initial_release_date": "2024-12-09T00:00:00",
  "last_revision_date": "2024-12-09T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1052",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": "2024-12-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-50",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-50"
    },
    {
      "published_at": "2024-12-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-48",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-48"
    },
    {
      "published_at": "2024-12-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-49",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-49"
    }
  ]
}

CERTFR-2024-AVI-1018
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Qnap N/A Photo Station versions 6.4.x antérieures à 6.4.3
Qnap QuRouter QuRouter versions 2.4.x antérieures à 2.4.4.106
Qnap QuLog Center QuLog Center versions 1.8.x antérieures à 1.8.0.888
Qnap QuRouter QuRouter versions 2.4.x antérieures à 2.4.3.103
Qnap QuTS hero QuTS hero versions h5.2.x antérieures à h5.2.1.2929 build 20241025
Qnap N/A Notes Station 3 versions 3.9.x antérieures à 3.9.7
Qnap QuTS hero QuTS hero versions h5.1.x antérieures à h5.1.8.2823 build 20240712
Qnap QTS QTS versions 5.1.x antérieures à 5.1.8.2823 build 20240712
Qnap N/A Media Streaming add-on versions 500.1.x antérieures à 500.1.1.6
Qnap QTS QTS versions 5.2.x antérieures à 5.2.1.2930 build 20241025
Qnap N/A QNAP AI Core versions 3.4.x antérieures à 3.4.1
Qnap QuLog Center QuLog Center versions 1.7.x antérieures à 1.7.0.831
References
Bulletin de sécurité Qnap QSA-24-44 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-36 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-37 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-39 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-47 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-40 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-46 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-43 2024-11-23 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Photo Station versions 6.4.x ant\u00e9rieures \u00e0 6.4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuRouter versions 2.4.x ant\u00e9rieures \u00e0 2.4.4.106",
      "product": {
        "name": "QuRouter",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuLog Center versions 1.8.x ant\u00e9rieures \u00e0 1.8.0.888",
      "product": {
        "name": "QuLog Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuRouter versions 2.4.x ant\u00e9rieures \u00e0 2.4.3.103",
      "product": {
        "name": "QuRouter",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.2.x ant\u00e9rieures \u00e0 h5.2.1.2929 build 20241025",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Notes Station 3 versions 3.9.x ant\u00e9rieures \u00e0 3.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.8.2823 build 20240712",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.8.2823 build 20240712",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Media Streaming add-on versions 500.1.x ant\u00e9rieures \u00e0 500.1.1.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.2.x ant\u00e9rieures \u00e0 5.2.1.2930 build 20241025",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP AI Core versions 3.4.x ant\u00e9rieures \u00e0 3.4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuLog Center versions 1.7.x ant\u00e9rieures \u00e0 1.7.0.831 ",
      "product": {
        "name": "QuLog Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-50397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50397"
    },
    {
      "name": "CVE-2024-37050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37050"
    },
    {
      "name": "CVE-2024-38643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38643"
    },
    {
      "name": "CVE-2024-50398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50398"
    },
    {
      "name": "CVE-2024-37042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37042"
    },
    {
      "name": "CVE-2024-32768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32768"
    },
    {
      "name": "CVE-2024-48860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48860"
    },
    {
      "name": "CVE-2024-50399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50399"
    },
    {
      "name": "CVE-2024-48861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48861"
    },
    {
      "name": "CVE-2024-48862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48862"
    },
    {
      "name": "CVE-2024-32770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32770"
    },
    {
      "name": "CVE-2024-37049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37049"
    },
    {
      "name": "CVE-2024-38644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38644"
    },
    {
      "name": "CVE-2024-37041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37041"
    },
    {
      "name": "CVE-2024-37048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37048"
    },
    {
      "name": "CVE-2024-50396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50396"
    },
    {
      "name": "CVE-2024-32767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32767"
    },
    {
      "name": "CVE-2024-37045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37045"
    },
    {
      "name": "CVE-2024-38647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38647"
    },
    {
      "name": "CVE-2024-37046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37046"
    },
    {
      "name": "CVE-2024-37047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37047"
    },
    {
      "name": "CVE-2023-38408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
    },
    {
      "name": "CVE-2024-32769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32769"
    },
    {
      "name": "CVE-2024-50400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50400"
    },
    {
      "name": "CVE-2020-14145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
    },
    {
      "name": "CVE-2024-38645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38645"
    },
    {
      "name": "CVE-2024-50395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50395"
    },
    {
      "name": "CVE-2024-37043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37043"
    },
    {
      "name": "CVE-2021-41617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
    },
    {
      "name": "CVE-2024-38646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38646"
    },
    {
      "name": "CVE-2024-37044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37044"
    },
    {
      "name": "CVE-2024-50401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50401"
    }
  ],
  "initial_release_date": "2024-11-25T00:00:00",
  "last_revision_date": "2024-11-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1018",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-44",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-44"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-36",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-36"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-37",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-37"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-39",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-39"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-47",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-47"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-40",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-40"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-46",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-46"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-43",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-43"
    }
  ]
}

CERTFR-2024-AVI-0752
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Qnap QuTS hero QuTS hero versions h4.5.x antérieures à h4.5.4.2790 build 20240606
Qnap QTS QTS versions 4.3.4 antérieures à 4.3.4.2814 build 20240618
Qnap Download Station Download Station versions 5.8.x antérieures à 5.8.6.283
Qnap QTS QTS versions 4.3.3 antérieures à 4.3.3.2784 build 20240619
Qnap QuMagie QuMagie versions 2.3.x antérieures à 2.3.1
Qnap QTS QTS versions 4.2.6 antérieures à 4.2.6 build 20240618
Qnap QTS QTS versions 4.3.6 antérieures à 4.3.6.2805 build 20240619
Qnap Helpdesk Helpdesk versions 3.3.x antérieures à 3.3.1
Qnap Notes Station Notes Station 3 versions 3.9.x antérieures à 3.9.6
Qnap QTS QTS versions 5.1.x antérieures à 5.2.0.2782 build 20240601
Qnap QuTS hero QuTS hero versions h4.5.x antérieures à h4.5.4.2626 build 20231225
Qnap QuTS hero QuTS hero versions h5.1.x antérieures à h5.2.0.2782 build 20240601
Qnap Music Station Music Station versions 5.4.x antérieures à 5.4.0
Qnap Video Station Video Station versions 5.8.x antérieures à 5.8.2
Qnap QTS QTS versions 4.5.x antérieures à 4.5.4.2790 build 20240605
Qnap QuLog Center QuLog Center versions 1.7.x.x antérieures à 1.7.0.827
Qnap QuLog Center QuLog Center versions 1.8.x.x antérieures à 1.8.0.872
Qnap QVR QVR Smart Client versions 2.4.x.x antérieures à 2.4.0.0570
References
Bulletin de sécurité Qnap QSA-24-24 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-26 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-34 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-30 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-21 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-27 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-29 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-28 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-32 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-25 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-33 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-22 2024-09-07 vendor-advisory
Bulletin de sécurité Qnap QSA-24-35 2024-09-07 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2790 build 20240606",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.3.4 ant\u00e9rieures \u00e0 4.3.4.2814 build 20240618",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Download Station versions 5.8.x ant\u00e9rieures \u00e0 5.8.6.283",
      "product": {
        "name": "Download Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.3.3 ant\u00e9rieures \u00e0 4.3.3.2784 build 20240619",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuMagie versions 2.3.x ant\u00e9rieures \u00e0 2.3.1",
      "product": {
        "name": "QuMagie",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.2.6 ant\u00e9rieures \u00e0 4.2.6 build 20240618",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.3.6 ant\u00e9rieures \u00e0 4.3.6.2805 build 20240619",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Helpdesk versions 3.3.x ant\u00e9rieures \u00e0 3.3.1",
      "product": {
        "name": "Helpdesk",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Notes Station 3 versions 3.9.x ant\u00e9rieures \u00e0 3.9.6",
      "product": {
        "name": "Notes Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.2.0.2782 build 20240601",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2626 build 20231225",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.2.0.2782 build 20240601",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Music Station versions 5.4.x ant\u00e9rieures \u00e0 5.4.0",
      "product": {
        "name": "Music Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Video Station versions 5.8.x ant\u00e9rieures \u00e0 5.8.2",
      "product": {
        "name": "Video Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2790 build 20240605",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuLog Center versions 1.7.x.x ant\u00e9rieures \u00e0 1.7.0.827",
      "product": {
        "name": "QuLog Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuLog Center versions 1.8.x.x ant\u00e9rieures \u00e0 1.8.0.872",
      "product": {
        "name": "QuLog Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QVR Smart Client versions 2.4.x.x ant\u00e9rieures \u00e0 2.4.0.0570",
      "product": {
        "name": "QVR",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2022-27592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27592"
    },
    {
      "name": "CVE-2023-50360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50360"
    },
    {
      "name": "CVE-2024-32762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32762"
    },
    {
      "name": "CVE-2024-21906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21906"
    },
    {
      "name": "CVE-2024-38640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38640"
    },
    {
      "name": "CVE-2024-53691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53691"
    },
    {
      "name": "CVE-2023-34974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34974"
    },
    {
      "name": "CVE-2024-27125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27125"
    },
    {
      "name": "CVE-2024-32763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32763"
    },
    {
      "name": "CVE-2024-27126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27126"
    },
    {
      "name": "CVE-2023-47563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47563"
    },
    {
      "name": "CVE-2024-38641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38641"
    },
    {
      "name": "CVE-2024-38642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38642"
    },
    {
      "name": "CVE-2023-34979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34979"
    },
    {
      "name": "CVE-2023-39298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39298"
    },
    {
      "name": "CVE-2023-39300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39300"
    },
    {
      "name": "CVE-2023-45038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45038"
    },
    {
      "name": "CVE-2024-32771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32771"
    },
    {
      "name": "CVE-2023-38545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
    },
    {
      "name": "CVE-2024-27122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27122"
    }
  ],
  "initial_release_date": "2024-09-09T00:00:00",
  "last_revision_date": "2025-01-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0752",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-09T00:00:00.000000"
    },
    {
      "description": "Ajout de l\u0027identifiant CVE-2024-53691.",
      "revision_date": "2025-01-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-24",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-24"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-26",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-26"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-34",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-34"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-30",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-30"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-21",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-21"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-27",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-27"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-29",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-29"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-28",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-28"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-32",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-32"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-25",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-25"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-33",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-33"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-22",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-22"
    },
    {
      "published_at": "2024-09-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-35",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-35"
    }
  ]
}

CERTFR-2024-AVI-0428
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Qnap QTS QTS versions 5.1.x antérieures à 5.1.7.2770 build 20240520
Qnap QuTS hero QuTS hero versions h5.1.x antérieures à h5.1.7.2770 build 20240520
References
Bulletin de sécurité Qnap qsa-24-23 2024-05-21 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.7.2770 build 20240520",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.7.2770 build 20240520",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-21902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21902"
    },
    {
      "name": "CVE-2024-27128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27128"
    },
    {
      "name": "CVE-2024-27127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27127"
    },
    {
      "name": "CVE-2024-27130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27130"
    },
    {
      "name": "CVE-2024-27129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27129"
    }
  ],
  "initial_release_date": "2024-05-22T00:00:00",
  "last_revision_date": "2024-05-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0428",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-05-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans  les produits Qnap. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": "2024-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-23",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-23"
    }
  ]
}

CERTFR-2024-AVI-0354
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap N/A QuTScloud versions c5.x antérieures à c5.1.5.2651
Qnap QTS QTS versions 5.1.x antérieures à 5.1.6.2722 build 20240402
Qnap QTS QTS versions 4.5.x antérieures à 4.5.4.2627 build 20231225
Qnap QuTS hero QuTS hero versions h4.5.x antérieures à h4.5.4.2626 build 20231225
Qnap N/A myQNAPcloud versions 1.0.x antérieures à 1.0.52
Qnap N/A Proxy Server versions 1.4.x antérieures à 1.4.6
Qnap N/A myQNAPcloud Link versions 2.4.x antérieures à 2.4.51
Qnap N/A Media Streaming add-on versions 500.1.x antérieures à 500.1.1.5
Qnap QuTS hero QuTS hero versions h5.1.x antérieures à h5.1.6.2734 build 20240414
Qnap N/A QuFirewall versions 2.4.x antérieures à 2.4.1

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.5.2651",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.6.2722 build 20240402",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2627 build 20231225",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2626 build 20231225",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "myQNAPcloud versions 1.0.x ant\u00e9rieures \u00e0 1.0.52",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Proxy Server versions 1.4.x ant\u00e9rieures \u00e0 1.4.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "myQNAPcloud Link versions 2.4.x ant\u00e9rieures \u00e0 2.4.51",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Media Streaming add-on versions 500.1.x ant\u00e9rieures \u00e0 500.1.1.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.6.2734 build 20240414",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuFirewall versions 2.4.x ant\u00e9rieures \u00e0 2.4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-32766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32766"
    },
    {
      "name": "CVE-2023-5824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5824"
    },
    {
      "name": "CVE-2024-27124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27124"
    },
    {
      "name": "CVE-2023-50363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50363"
    },
    {
      "name": "CVE-2023-46846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46846"
    },
    {
      "name": "CVE-2023-46847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46847"
    },
    {
      "name": "CVE-2023-41290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41290"
    },
    {
      "name": "CVE-2024-21905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21905"
    },
    {
      "name": "CVE-2023-46724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46724"
    },
    {
      "name": "CVE-2024-21900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21900"
    },
    {
      "name": "CVE-2023-41291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41291"
    },
    {
      "name": "CVE-2023-51365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51365"
    },
    {
      "name": "CVE-2024-21901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21901"
    },
    {
      "name": "CVE-2024-32764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32764"
    },
    {
      "name": "CVE-2023-50364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50364"
    },
    {
      "name": "CVE-2024-21899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21899"
    },
    {
      "name": "CVE-2023-51364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51364"
    },
    {
      "name": "CVE-2023-50362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50362"
    },
    {
      "name": "CVE-2023-47222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47222"
    },
    {
      "name": "CVE-2023-50361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50361"
    }
  ],
  "initial_release_date": "2024-04-29T00:00:00",
  "last_revision_date": "2024-04-29T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0354",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-04-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-16 du 26 avril 2024",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-16"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-15 du 26 avril 2024",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-15"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-18 du 26 avril 2024",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-18"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-14 du 26 avril 2024",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-14"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-20 du 26 avril 2024",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-20"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-17 du 26 avril 2024",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-17"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-24-09 du 09 mars 2024",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-09"
    }
  ]
}

CERTFR-2024-AVI-0201
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une injection de code indirecte à distance (XSS), et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap N/A QuTScloud versions c5.x antérieures à c5.1.5.2651
Qnap N/A Photo Station versions 6.4.x antérieures à 6.4.2
Qnap QTS QTS versions 4.5.x antérieures à 4.5.4.2627 build 20231225
Qnap QTS QTS versions 5.1.x antérieures à 5.1.4.2596 build 20231128
Qnap QuTS hero QuTS hero versions h5.1.x antérieures à h5.1.4.2596 build 20231128
Qnap QuTS hero QuTS hero versions h4.5.x antérieures à h4.5.4.2626 build 20231225
Qnap N/A myQNAPcloud versions 1.0.x antérieures à 1.0.52

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.5.2651",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Photo Station versions 6.4.x ant\u00e9rieures \u00e0 6.4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2627 build 20231225",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.4.2596 build 20231128",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.4.2596 build 20231128",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2626 build 20231225",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "myQNAPcloud versions 1.0.x ant\u00e9rieures \u00e0 1.0.52",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-34975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34975"
    },
    {
      "name": "CVE-2023-47221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47221"
    },
    {
      "name": "CVE-2024-21900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21900"
    },
    {
      "name": "CVE-2024-21901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21901"
    },
    {
      "name": "CVE-2024-21899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21899"
    },
    {
      "name": "CVE-2023-32969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32969"
    },
    {
      "name": "CVE-2023-34980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34980"
    }
  ],
  "initial_release_date": "2024-03-11T00:00:00",
  "last_revision_date": "2024-03-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0201",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-03-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une injection de code indirecte \u00e0 distance (XSS), et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-09 du 09 mars 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-09"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-11 du 09 mars 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-11"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-12 du 09 mars 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-12"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-13 du 09 mars 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-13"
    }
  ]
}

CERTFR-2024-AVI-0118
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Contournement provisoire

S’il n’est pas possible de procéder à l’installation d’une version corrigeant la vulnérabilité, se référer aux mesures de contournement proposées par l’éditeur à la section Mitigation.

None
Impacted products
Vendor Product Description
Qnap N/A QuTScloud versions c5.x antérieures à c5.1.5.2651
Qnap QTS QTS versions 4.4.x antérieures à 4.5.4.2627 build 20231225
Qnap QTS QTS versions 4.3.x antérieures à 4.3.3.2644 build 20240131
Qnap QTS QTS versions 5.x.x antérieures à 5.1.5.2645 build 20240116
Qnap QTS QTS versions 4.3.x postérieures à 4.3.5 et antérieures à 4.3.6.2665 build 20240131
Qnap QuTS hero QuTS hero versions h5.x.x antérieures à h5.1.5.2647 build 20240118
Qnap QTS QTS versions 4.2.x antérieures à 4.2.6 build 20240131
Qnap QTS QTS versions 4.3.4 antérieures à 4.3.4.2675 build 20240131
Qnap QuTS hero QuTS hero versions h4.x antérieures à h4.5.4.2626 build 20231225
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.5.2651",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.4.x ant\u00e9rieures \u00e0 4.5.4.2627 build 20231225",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.3.x ant\u00e9rieures \u00e0 4.3.3.2644 build 20240131",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.x.x ant\u00e9rieures \u00e0 5.1.5.2645 build 20240116",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.3.x post\u00e9rieures \u00e0 4.3.5 et ant\u00e9rieures \u00e0 4.3.6.2665 build 20240131",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.x.x ant\u00e9rieures \u00e0 h5.1.5.2647 build 20240118",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.2.x ant\u00e9rieures \u00e0 4.2.6 build 20240131",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.3.4 ant\u00e9rieures \u00e0 4.3.4.2675 build 20240131",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h4.x ant\u00e9rieures \u00e0 h4.5.4.2626 build 20231225",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\n## Contournement provisoire\n\nS\u2019il n\u2019est pas possible de proc\u00e9der \u00e0 l\u2019installation d\u2019une version\ncorrigeant la vuln\u00e9rabilit\u00e9, se r\u00e9f\u00e9rer aux mesures de contournement\npropos\u00e9es par l\u2019\u00e9diteur \u00e0 la section *Mitigation*.\n",
  "cves": [
    {
      "name": "CVE-2023-50358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50358"
    },
    {
      "name": "CVE-2023-47218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47218"
    }
  ],
  "initial_release_date": "2024-02-13T00:00:00",
  "last_revision_date": "2024-02-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0118",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-57 du 13 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-57"
    }
  ]
}

CERTFR-2024-AVI-0094
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QuTS hero QuTS hero h4.5.x versions antérieures à QuTS hero h4.5.4.2626 build 20231225
Qnap N/A Qsync Central 4.3.x versions antérieures à Qsync Central 4.3.0.11
Qnap QTS QTS 5.1.x versions antérieures à QTS 5.1.5.2645 build 20240116
Qnap N/A QuTScloud c5.x versions antérieures à QuTScloud c5.1.5.2651
Qnap QTS QTS 5.1.x versions antérieures à QTS 5.1.2.2533 build 20230926
Qnap QuTS hero QuTS hero h5.1.x versions antérieures à QuTS hero h5.1.3.2578 build 20231110
Qnap QuTS hero QuTS hero h5.1.x versions antérieures à QuTS hero h5.1.5.2647 build 20240118
Qnap N/A Photo Station 6.4.x versions antérieures à Photo Station 6.4.2
Qnap QTS QTS 5.1.x versions antérieures à QTS 5.1.3.2578 build 20231110
Qnap N/A Qsync Central 4.4.x versions antérieures à Qsync Central 4.4.0.15
Qnap QuTS hero QuTS hero h5.1.x versions antérieures à QuTS hero h5.1.4.2596 build 20231128
Qnap QuTS hero QuTS hero h5.1.x versions antérieures à QuTS hero h5.1.2.2534 build 20230927
Qnap QTS QTS 5.1.x versions antérieures à QTS 5.1.4.2596 build 20231128
Qnap QTS QTS 4.5.x versions antérieures à QTS 4.5.4.2627 build 20231225

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QuTS hero h4.5.x versions ant\u00e9rieures \u00e0 QuTS hero h4.5.4.2626 build 20231225",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qsync Central 4.3.x versions ant\u00e9rieures \u00e0 Qsync Central 4.3.0.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS 5.1.x versions ant\u00e9rieures \u00e0 QTS 5.1.5.2645 build 20240116",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTScloud c5.x versions ant\u00e9rieures \u00e0 QuTScloud c5.1.5.2651",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS 5.1.x versions ant\u00e9rieures \u00e0 QTS 5.1.2.2533 build 20230926",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 QuTS hero h5.1.3.2578 build 20231110",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 QuTS hero h5.1.5.2647 build 20240118",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Photo Station 6.4.x versions ant\u00e9rieures \u00e0 Photo Station 6.4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS 5.1.x versions ant\u00e9rieures \u00e0 QTS 5.1.3.2578 build 20231110",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qsync Central 4.4.x versions ant\u00e9rieures \u00e0 Qsync Central 4.4.0.15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 QuTS hero h5.1.4.2596 build 20231128",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 QuTS hero h5.1.2.2534 build 20230927",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS 5.1.x versions ant\u00e9rieures \u00e0 QTS 5.1.4.2596 build 20231128",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS 4.5.x versions ant\u00e9rieures \u00e0 QTS 4.5.4.2627 build 20231225",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-41276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41276"
    },
    {
      "name": "CVE-2023-50359",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50359"
    },
    {
      "name": "CVE-2023-41279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41279"
    },
    {
      "name": "CVE-2023-41275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41275"
    },
    {
      "name": "CVE-2023-47561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47561"
    },
    {
      "name": "CVE-2023-39297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39297"
    },
    {
      "name": "CVE-2023-47562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47562"
    },
    {
      "name": "CVE-2023-47566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47566"
    },
    {
      "name": "CVE-2023-32967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32967"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2023-45036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45036"
    },
    {
      "name": "CVE-2023-41278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41278"
    },
    {
      "name": "CVE-2023-45035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45035"
    },
    {
      "name": "CVE-2023-47564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47564"
    },
    {
      "name": "CVE-2023-41292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41292"
    },
    {
      "name": "CVE-2023-41273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41273"
    },
    {
      "name": "CVE-2023-45028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45028"
    },
    {
      "name": "CVE-2023-47568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47568"
    },
    {
      "name": "CVE-2023-41283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41283"
    },
    {
      "name": "CVE-2023-45025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45025"
    },
    {
      "name": "CVE-2023-39302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39302"
    },
    {
      "name": "CVE-2023-39303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39303"
    },
    {
      "name": "CVE-2023-41277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41277"
    },
    {
      "name": "CVE-2023-41281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41281"
    },
    {
      "name": "CVE-2023-41282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41282"
    },
    {
      "name": "CVE-2023-41274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41274"
    },
    {
      "name": "CVE-2023-45037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45037"
    },
    {
      "name": "CVE-2023-45027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45027"
    },
    {
      "name": "CVE-2023-47567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47567"
    },
    {
      "name": "CVE-2023-45026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45026"
    },
    {
      "name": "CVE-2023-41280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41280"
    }
  ],
  "initial_release_date": "2024-02-05T00:00:00",
  "last_revision_date": "2024-02-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0094",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-30 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-30"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-06 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-06"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-46 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-46"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-08 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-08"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-03 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-03"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-53 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-53"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-33 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-33"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-01 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-01"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-05 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-05"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-04 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-04"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-38 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-38"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-02 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-02"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-07 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-24-07"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-47 du 03 f\u00e9vrier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-47"
    }
  ]
}

CERTFR-2024-AVI-0011
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap N/A QcalAgent versions 1.1.x antérieures à 1.1.8
Qnap QTS QTS versions 5.1.x antérieures à 5.1.4.2596 build 20231128
Qnap QuTS hero QuTS hero versions h5.1.x antérieures à h5.1.4.2596 build 20231128
Qnap Video Station Video Station versions 5.7.x antérieures à 5.7.2
Qnap QuMagie QuMagie versions 2.2.x antérieures à 2.2.1

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QcalAgent versions 1.1.x ant\u00e9rieures \u00e0 1.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.4.2596 build 20231128",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.4.2596 build 20231128",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Video Station versions 5.7.x ant\u00e9rieures \u00e0 5.7.2",
      "product": {
        "name": "Video Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuMagie versions 2.2.x ant\u00e9rieures \u00e0 2.2.1",
      "product": {
        "name": "QuMagie",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-41288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41288"
    },
    {
      "name": "CVE-2022-43634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43634"
    },
    {
      "name": "CVE-2023-45041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45041"
    },
    {
      "name": "CVE-2023-47560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47560"
    },
    {
      "name": "CVE-2023-45039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45039"
    },
    {
      "name": "CVE-2023-45043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45043"
    },
    {
      "name": "CVE-2023-47559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47559"
    },
    {
      "name": "CVE-2023-41287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41287"
    },
    {
      "name": "CVE-2023-39296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39296"
    },
    {
      "name": "CVE-2023-45044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45044"
    },
    {
      "name": "CVE-2023-39294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39294"
    },
    {
      "name": "CVE-2023-45042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45042"
    },
    {
      "name": "CVE-2023-47219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47219"
    },
    {
      "name": "CVE-2023-41289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41289"
    },
    {
      "name": "CVE-2023-45040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45040"
    }
  ],
  "initial_release_date": "2024-01-08T00:00:00",
  "last_revision_date": "2024-01-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0011",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-01-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-32 du 06 janvier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-32"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-23 du 06 janvier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-23"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-54 du 06 janvier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-54"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-34 du 06 janvier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-34"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-27 du 06 janvier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-27"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-22 du 06 janvier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-22"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-64 du 06 janvier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-64"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-55 du 06 janvier 2024",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-55"
    }
  ]
}

CERTFR-2023-AVI-1011
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QuTS hero Qnap QuTS hero h5.0.x versions antérieures à h5.0.1.2515 build 20230907
Qnap QTS Qnap QTS 5.0.x versions antérieures à 5.0.1.2514 build 20230906
Qnap QTS Qnap QTS 4.5.x versions antérieures à 4.5.4.2467 build 20230718
Qnap QTS Qnap QTS 5.1.x versions antérieures à 5.1.3.2578 build 20231110
Qnap QVR Qnap QVR Firmware 4.x versions antérieures à 5.x
Qnap QuTS hero Qnap QuTS hero h5.1.x versions antérieures à h5.1.3.2578 build 20231110
Qnap QuTS hero Qnap QuTS hero h4.5.x versions antérieures à h4.5.4.2476 build 20230728

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Qnap QuTS hero h5.0.x versions ant\u00e9rieures \u00e0 h5.0.1.2515 build 20230907",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QTS 5.0.x versions ant\u00e9rieures \u00e0 5.0.1.2514 build 20230906",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QTS 4.5.x versions ant\u00e9rieures \u00e0 4.5.4.2467 build 20230718",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QTS 5.1.x versions ant\u00e9rieures \u00e0 5.1.3.2578 build 20231110",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QVR Firmware 4.x versions ant\u00e9rieures \u00e0 5.x",
      "product": {
        "name": "QVR",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 h5.1.3.2578 build 20231110",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QuTS hero h4.5.x versions ant\u00e9rieures \u00e0 h4.5.4.2476 build 20230728",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-4091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
    },
    {
      "name": "CVE-2023-42669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
    },
    {
      "name": "CVE-2023-42670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
    },
    {
      "name": "CVE-2023-4154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
    },
    {
      "name": "CVE-2023-23372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23372"
    },
    {
      "name": "CVE-2023-3961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3961"
    },
    {
      "name": "CVE-2023-32975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32975"
    },
    {
      "name": "CVE-2023-32968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32968"
    },
    {
      "name": "CVE-2023-47565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47565"
    }
  ],
  "initial_release_date": "2023-12-11T00:00:00",
  "last_revision_date": "2023-12-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-1011",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-12-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une\nex\u00e9cution de code arbitraire et une injection de code indirecte \u00e0\ndistance (XSS).\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-07 du 09 d\u00e9cembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-07"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-40 du 09 d\u00e9cembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-40"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-48 du 09 d\u00e9cembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-48"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-20 du 09 d\u00e9cembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-20"
    }
  ]
}

CERTFR-2023-AVI-0931
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QuMagie Qnap QuMagie versions 2.1.x antérieures à 2.1.4
Qnap QTS Qnap QTS versions 5.0.x antérieures à 5.0.1.2376 build 20230421
Qnap N/A QNap QuTScloud versions c5.x antérieures à c5.1.0.2498
Qnap QuTS hero Qnap QuTS hero versions h5.0.x antérieures à h5.0.1.2376 build 20230421
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Qnap QuMagie versions 2.1.x ant\u00e9rieures \u00e0 2.1.4",
      "product": {
        "name": "QuMagie",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QTS versions 5.0.x ant\u00e9rieures \u00e0 5.0.1.2376 build 20230421",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNap QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.0.2498",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QuTS hero versions h5.0.x ant\u00e9rieures \u00e0 h5.0.1.2376 build 20230421",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-23367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23367"
    },
    {
      "name": "CVE-2023-39295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39295"
    },
    {
      "name": "CVE-2023-41284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41284"
    },
    {
      "name": "CVE-2023-41285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41285"
    }
  ],
  "initial_release_date": "2023-11-13T00:00:00",
  "last_revision_date": "2023-11-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0931",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-11-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-24 du 11 novembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-24"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-50 du 11 novembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-50"
    }
  ]
}

CERTFR-2023-AVI-0915
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap Music Station QNAP Music Station versions 5.1.x antérieures à 5.1.16
Qnap QuTS hero QNAP QuTS hero versions h4.5.x antérieures à h4.5.4.2374 build 20230417
Qnap QTS QNAP QTS versions 5.0.x antérieures à 5.0.1.2514 build 20230906
Qnap QTS QNAP QTS versions 4.2.x antérieures à 4.2.6 build 20230621
Qnap QTS QNAP QTS versions 4.3.3.x antérieures à 4.3.3.2420 build 20230621
Qnap QTS QNAP QTS versions 4.5.x antérieures à 4.5.4.2374 build 20230416
Qnap N/A QNAP QuTScloud versions c5.x antérieures à c5.1.0.2498
Qnap N/A QNAP Media Streaming add-on versions 500.0.x antérieures à 500.0.0.11
Qnap N/A QNAP Multimedia Console versions 2.1.x antérieures à 2.1.2
Qnap N/A QNAP Media Streaming add-on versions 500.1.x antérieures à 500.1.1.2
Qnap Music Station QNAP Music Station versions 5.3.x antérieures à 5.3.23
Qnap N/A QNAP Multimedia Console versions 1.4.x antérieures à 1.4.8
Qnap QuTS hero QNAP QuTS hero versions h5.0.x antérieures à h5.0.1.2515 build 20230907
Qnap QTS QNAP QTS versions 5.1.x antérieures à 5.1.1.2491 build 20230815
Qnap Music Station QNAP Music Station versions 4.8.x antérieures à 4.8.11
Qnap QuTS hero QNAP QuTS hero versions h5.1.x antérieures à h5.1.1.2488 build 20230812
Qnap QTS QNAP QTS versions 4.3.6.x antérieures à 4.3.6.2441 build 20230621
Qnap QTS QNAP QTS versions 4.3.4.x antérieures à 4.3.4.2451 build 20230621

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QNAP Music Station versions 5.1.x ant\u00e9rieures \u00e0 5.1.16",
      "product": {
        "name": "Music Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2374 build 20230417",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP QTS versions 5.0.x ant\u00e9rieures \u00e0 5.0.1.2514 build 20230906",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP QTS versions 4.2.x ant\u00e9rieures \u00e0 4.2.6 build 20230621",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP QTS versions 4.3.3.x ant\u00e9rieures \u00e0 4.3.3.2420 build 20230621",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2374 build 20230416",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.0.2498",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP Media Streaming add-on versions 500.0.x ant\u00e9rieures \u00e0 500.0.0.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP Multimedia Console versions 2.1.x ant\u00e9rieures \u00e0 2.1.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP Media Streaming add-on versions 500.1.x ant\u00e9rieures \u00e0 500.1.1.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP Music Station versions 5.3.x ant\u00e9rieures \u00e0 5.3.23",
      "product": {
        "name": "Music Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP Multimedia Console versions 1.4.x ant\u00e9rieures \u00e0 1.4.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP QuTS hero versions h5.0.x ant\u00e9rieures \u00e0 h5.0.1.2515 build 20230907",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.1.2491 build 20230815",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP Music Station versions 4.8.x ant\u00e9rieures \u00e0 4.8.11",
      "product": {
        "name": "Music Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.1.2488 build 20230812",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP QTS versions 4.3.6.x ant\u00e9rieures \u00e0 4.3.6.2441 build 20230621",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP QTS versions 4.3.4.x ant\u00e9rieures \u00e0 4.3.4.2451 build 20230621",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-39299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39299"
    },
    {
      "name": "CVE-2023-39301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39301"
    },
    {
      "name": "CVE-2023-23368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23368"
    },
    {
      "name": "CVE-2023-23369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23369"
    }
  ],
  "initial_release_date": "2023-11-06T00:00:00",
  "last_revision_date": "2023-11-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0915",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-11-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-31 du 04 novembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-31"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-61 du 04 novembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-61"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-51 du 04 novembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-51"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-35 du 04 novembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-35"
    }
  ]
}

CERTFR-2023-AVI-0846
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap N/A Container Station versions 5..6.x antérieures à 2.6.7.44
Qnap QTS QTS hero versions h5.0.x antérieures à h5.0.1.2515 build 20230907
Qnap QTS QTS versions 5.1.x antérieures à 5.1.0.2444 build 20230629
Qnap QTS QTS versions 4.5.x antérieures à 4.5.4.2467 build 20230718
Qnap QTS QTS hero versions h5.1.x antérieures à h5.1.0.2424 build 20230609
Qnap N/A QuTScloud versions c5.x antérieures à c5.1.0.2498
Qnap QTS QTS hero versions h4.5.x antérieures à h4.5.4.2476 build 20230728
Qnap QTS QTS versions 5.0.x antérieures à 5.0.1.2425 build 20230609
Qnap Video Station Video Station versions 5.7.x antérieures à 5.7.0 (2023/07/27)

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Container Station versions 5..6.x ant\u00e9rieures \u00e0 2.6.7.44",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS hero versions h5.0.x ant\u00e9rieures \u00e0 h5.0.1.2515 build 20230907",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.0.2444 build 20230629",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2467 build 20230718",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.0.2424 build 20230609",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTScloud versions c5.x ant\u00e9rieures \u00e0 c5.1.0.2498",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2476 build 20230728",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.0.x ant\u00e9rieures \u00e0 5.0.1.2425 build 20230609",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Video Station versions 5.7.x ant\u00e9rieures \u00e0 5.7.0 (2023/07/27)",
      "product": {
        "name": "Video Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-34975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34975"
    },
    {
      "name": "CVE-2023-34977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34977"
    },
    {
      "name": "CVE-2023-32976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32976"
    },
    {
      "name": "CVE-2023-32973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32973"
    },
    {
      "name": "CVE-2023-32970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32970"
    },
    {
      "name": "CVE-2023-34976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34976"
    },
    {
      "name": "CVE-2023-32974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32974"
    }
  ],
  "initial_release_date": "2023-10-16T00:00:00",
  "last_revision_date": "2023-10-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0846",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-10-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-42 du 14 octobre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-42"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-52 du 14 octobre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-52"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-41 du 14 octobre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-41"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-44 du 14 octobre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-44"
    }
  ]
}

CERTFR-2023-AVI-0815
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap N/A QVPN Windows 2.1.x versions antérieures à 2.1.0.0518
Qnap QuTS hero QuTS hero h5.0.x versions antérieures à h5.0.1.2515 build 20230907
Qnap N/A QuTScloud c5.x versions antérieures à c5.1.0.2498
Qnap QTS QTS 5.0.x versions antérieures à 5.0.1.2425 build 20230609
Qnap QTS QTS 4.5.x versions antérieures à 4.5.4.2467 build 20230718
Qnap QuTS hero QuTS hero h5.1.x versions antérieures à h5.1.0.2424 build 20230609
Qnap QuTS hero QuTS hero h4.5.x versions antérieures à h4.5.4.2476 build 20230728
Qnap Music Station Qnap Music Station versions 5.3.x antérieures à 5.3.22
Qnap N/A QVPN Windows 2.2.x versions antérieures à 2.2.0.0823
Qnap QTS QTS 5.1.x versions antérieures à 5.1.0.2444 build 20230629

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QVPN Windows 2.1.x versions ant\u00e9rieures \u00e0 2.1.0.0518",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero h5.0.x versions ant\u00e9rieures \u00e0 h5.0.1.2515 build 20230907",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTScloud c5.x versions ant\u00e9rieures \u00e0 c5.1.0.2498",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS 5.0.x versions ant\u00e9rieures \u00e0 5.0.1.2425 build 20230609",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS 4.5.x versions ant\u00e9rieures \u00e0 4.5.4.2467 build 20230718",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero h5.1.x versions ant\u00e9rieures \u00e0 h5.1.0.2424 build 20230609",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero h4.5.x versions ant\u00e9rieures \u00e0 h4.5.4.2476 build 20230728",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap Music Station versions 5.3.x ant\u00e9rieures \u00e0 5.3.22",
      "product": {
        "name": "Music Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QVPN Windows 2.2.x versions ant\u00e9rieures \u00e0 2.2.0.0823",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS 5.1.x versions ant\u00e9rieures \u00e0 5.1.0.2444 build 20230629",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-20052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20052"
    },
    {
      "name": "CVE-2023-32972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32972"
    },
    {
      "name": "CVE-2023-23366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23366"
    },
    {
      "name": "CVE-2023-23365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23365"
    },
    {
      "name": "CVE-2023-23370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23370"
    },
    {
      "name": "CVE-2023-32971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32971"
    },
    {
      "name": "CVE-2023-20032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20032"
    },
    {
      "name": "CVE-2023-23371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23371"
    }
  ],
  "initial_release_date": "2023-10-09T00:00:00",
  "last_revision_date": "2023-10-09T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0815",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-10-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-26 du 07 octobre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-26"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-39 du 07 octobre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-39"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-36 du 07 octobre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-36"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-28 du 07 octobre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-28"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-37 du 07 octobre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-37"
    }
  ]
}

CERTFR-2023-AVI-0771
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un problème de sécurité non spécifié par l'éditeur.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QuTS hero QuTS hero versions 5.1.0.x antérieures à h5.1.0.2392 build 20230508
Qnap QTS QTS versions 5.1.0.x antérieures à 5.1.0.2348 build 2023032
Qnap N/A QuTScloud versions c5.0.1.x antérieures à c5.0.1.2374
Qnap N/A Multimedia Console versions 2.1.x antérieures à 2.1.1 (2023/03/29)
Qnap N/A Multimedia Console versions 1.4.x antérieures à 1.4.7 (2023/03/20)

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QuTS hero versions 5.1.0.x ant\u00e9rieures \u00e0 h5.1.0.2392 build 20230508",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.0.x ant\u00e9rieures \u00e0 5.1.0.2348 build 2023032",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTScloud versions c5.0.1.x ant\u00e9rieures \u00e0 c5.0.1.2374",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Multimedia Console versions 2.1.x ant\u00e9rieures \u00e0 2.1.1 (2023/03/29)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Multimedia Console versions 1.4.x ant\u00e9rieures \u00e0 1.4.7 (2023/03/20)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-36760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36760"
    },
    {
      "name": "CVE-2006-20001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-20001"
    },
    {
      "name": "CVE-2023-23364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23364"
    },
    {
      "name": "CVE-2022-37436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37436"
    },
    {
      "name": "CVE-2023-23363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23363"
    }
  ],
  "initial_release_date": "2023-09-22T00:00:00",
  "last_revision_date": "2023-09-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0771",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-09-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un probl\u00e8me\nde s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-25 du 22 septembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-25"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-12 du 22 septembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-12"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-29 du 22 septembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-29"
    }
  ]
}

CERTFR-2023-AVI-0758
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance et une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QuTS hero QuTS hero versions antérieures à h5.0.1.2376 build 20230421
Qnap QuTS hero QuTS hero versions antérieures à h4.5.4.2374 build 20230417
Qnap QTS QTS versions antérieures à 4.5.4.2374 build 20230416
Qnap QTS QTS versions antérieures à 5.0.1.2376 build 20230421
Qnap N/A QuTScloud versions antérieures à c5.0.1.2374

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QuTS hero versions ant\u00e9rieures \u00e0 h5.0.1.2376 build 20230421",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions ant\u00e9rieures \u00e0 h4.5.4.2374 build 20230417",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions ant\u00e9rieures \u00e0 4.5.4.2374 build 20230416",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions ant\u00e9rieures \u00e0 5.0.1.2376 build 20230421",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTScloud versions ant\u00e9rieures \u00e0 c5.0.1.2374",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-23362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23362"
    },
    {
      "name": "CVE-2023-23359",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23359"
    },
    {
      "name": "CVE-2023-23361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23361"
    },
    {
      "name": "CVE-2023-23358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23358"
    },
    {
      "name": "CVE-2023-23360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23360"
    }
  ],
  "initial_release_date": "2023-09-18T00:00:00",
  "last_revision_date": "2023-09-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0758",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-09-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et\nune ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-21 du 16 septembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-21"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-18 du 16 septembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-18"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-19 du 16 septembre 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-19"
    }
  ]
}

CERTFR-2023-AVI-0685
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Qnap QTS et QuTS hero. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QuTS hero QuTS hero versions h4.5.4.x antérieures à h4.5.4.2476 build 20230728
Qnap QTS QTS versions 5.1.0.x antérieures à 5.1.0.2444 build 20230629
Qnap QTS QTS versions 5.0.1.x antérieures à 5.0.1.2425 build 20230609
Qnap QTS QTS versions 4.5.4.x antérieures à 4.5.4.2467 build 20230718
Qnap QuTS hero QuTS hero versions h5.1.0.x antérieures à h5.1.0.2424 build 20230609

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QuTS hero versions h4.5.4.x ant\u00e9rieures \u00e0 h4.5.4.2476 build 20230728",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.0.x ant\u00e9rieures \u00e0 5.1.0.2444 build 20230629",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.0.1.x ant\u00e9rieures \u00e0 5.0.1.2425 build 20230609",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.5.4.x ant\u00e9rieures \u00e0 4.5.4.2467 build 20230718",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.1.0.x ant\u00e9rieures \u00e0 h5.1.0.2424 build 20230609",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-34973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34973"
    },
    {
      "name": "CVE-2023-34972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34972"
    },
    {
      "name": "CVE-2023-34971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34971"
    }
  ],
  "initial_release_date": "2023-08-25T00:00:00",
  "last_revision_date": "2023-08-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0685",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-08-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Qnap QTS et QuTS\nhero. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Qnap QTS et QuTS hero",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-59 du 25 ao\u00fbt 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-59"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-58 du 25 ao\u00fbt 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-58"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-23-60 du 25 ao\u00fbt 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-60"
    }
  ]
}

CERTFR-2023-AVI-0602
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer un déni de service à distance et une exécution de code arbitraire.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QVR QVR Pro Appliance versions antérieures à 2.3.1.0476
Qnap QTS QTS versions antérieures à 4.5.4.2280 build 20230112
Qnap QuTS hero QuTS hero versions antérieures à h4.5.4.2374 build 20230417
Qnap N/A QVPN Device Client pour Windows versions antérieures à 2.0.0.1316
Qnap N/A QuTScloud versions antérieures à c5.0.1.2374 build 20230419
Qnap QTS QTS versions antérieures à 5.0.1.2277 build 20230112
Qnap QuTS hero QuTS hero versions antérieures à h5.0.1.2277 build 20230112
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QVR Pro Appliance versions ant\u00e9rieures \u00e0 2.3.1.0476",
      "product": {
        "name": "QVR",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions ant\u00e9rieures \u00e0 4.5.4.2280 build 20230112",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions ant\u00e9rieures \u00e0 h4.5.4.2374 build 20230417",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QVPN Device Client pour Windows versions ant\u00e9rieures \u00e0 2.0.0.1316",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTScloud versions ant\u00e9rieures \u00e0 c5.0.1.2374 build 20230419",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions ant\u00e9rieures \u00e0 5.0.1.2277 build 20230112",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions ant\u00e9rieures \u00e0 h5.0.1.2277 build 20230112",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-27600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27600"
    },
    {
      "name": "CVE-2022-27595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27595"
    }
  ],
  "initial_release_date": "2023-07-28T00:00:00",
  "last_revision_date": "2023-07-28T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0602",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-07-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Qnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un d\u00e9ni de service \u00e0 distance et une ex\u00e9cution de code\narbitraire.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-04 du 28 juillet 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-04"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-09 du 28 juillet 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-09"
    }
  ]
}

CERTFR-2023-AVI-0271
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QTS QTS versions 5.0.x antérieures à 5.0.1.2346 build 20230322
Qnap QuTS hero QuTS hero h5.0.x antérieures à h5.0.1.2348 build 20230324

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QTS versions 5.0.x ant\u00e9rieures \u00e0 5.0.1.2346 build 20230322",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero h5.0.x ant\u00e9rieures \u00e0 h5.0.1.2348 build 20230324",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-4304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2022-3437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3437"
    },
    {
      "name": "CVE-2023-22809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2022-42898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
    },
    {
      "name": "CVE-2022-3592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3592"
    },
    {
      "name": "CVE-2022-27597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27597"
    },
    {
      "name": "CVE-2022-27598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27598"
    },
    {
      "name": "CVE-2023-23355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23355"
    }
  ],
  "initial_release_date": "2023-03-30T00:00:00",
  "last_revision_date": "2023-03-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0271",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-03-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits \u003cspan\nclass=\"textit\"\u003eQnap\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-06 du 30 mars 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-06"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-10 du 30 mars 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-10"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-03 du 30 mars 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-03"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-15 du 30 mars 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-15"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-11 du 30 mars 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-11"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-23-02 du 30 mars 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-02"
    }
  ]
}

CERTFR-2023-AVI-0071
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans QNAP QTS et QuTS hero. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QTS QTS versions 5.0.1.x antérieures à 5.0.1.2234 build 20221201
Qnap QuTS hero QuTS hero versions h5.0.1.x antérieures à h5.0.1.2248 build 20221215
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QTS versions 5.0.1.x ant\u00e9rieures \u00e0 5.0.1.2234 build 20221201",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.0.1.x ant\u00e9rieures \u00e0 h5.0.1.2248 build 20221215",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-27596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27596"
    }
  ],
  "initial_release_date": "2023-01-30T00:00:00",
  "last_revision_date": "2023-01-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0071",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-01-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans QNAP QTS et QuTS hero. Elle\npermet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans QNAP QTS et QuTS hero",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-23-01 du 30 janvier 2023",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-23-01"
    }
  ]
}

CERTFR-2022-AVI-742
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Qnap QTS. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QTS QTS versions 5.x antérieures à 5.0.0.2131 build 20220815
Qnap QTS QTS versions antérieures à 4.5.4.2125 build 20220810
Qnap QTS QuTS hero h5.0.x et h4.5.x
Qnap QTS QuTScloud c5.0.1
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QTS versions 5.x ant\u00e9rieures \u00e0 5.0.0.2131 build 20220815",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions ant\u00e9rieures \u00e0 4.5.4.2125 build 20220810",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero h5.0.x et h4.5.x",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTScloud c5.0.1",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-32746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32746"
    },
    {
      "name": "CVE-2022-30522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30522"
    },
    {
      "name": "CVE-2022-32742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32742"
    },
    {
      "name": "CVE-2022-32745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32745"
    },
    {
      "name": "CVE-2022-2031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2031"
    },
    {
      "name": "CVE-2022-30556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30556"
    },
    {
      "name": "CVE-2022-28615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28615"
    },
    {
      "name": "CVE-2022-32744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32744"
    },
    {
      "name": "CVE-2022-31813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31813"
    },
    {
      "name": "CVE-2022-29404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29404"
    },
    {
      "name": "CVE-2022-26377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26377"
    },
    {
      "name": "CVE-2022-28330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28330"
    },
    {
      "name": "CVE-2022-28614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28614"
    }
  ],
  "initial_release_date": "2022-08-16T00:00:00",
  "last_revision_date": "2022-08-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-742",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-08-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Qnap QTS. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Qnap QTS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-23 du 16 ao\u00fbt 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-23"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-22 du 16 ao\u00fbt 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-22"
    }
  ]
}

CERTFR-2022-AVI-503
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans QNAP Proxy Server. Elle permet à un attaquant de provoquer une injection de requêtes illégitimes par rebond (CSRF).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QTS QTS versions 4.5.x et QTS versions 5.0.x avec Proxy Server versions antérieures à 1.4.2 (2021/12/30)
Qnap N/A QuTScloud versions c4.5.x et QuTScloud versions c5.0.x avec Proxy Server versions antérieures à 1.4.2 (2021/12/30)
Qnap QuTS hero QuTS hero versions h5.0.x avec Proxy Server versions antérieures à 1.4.3 (2022/01/18)
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QTS versions 4.5.x et QTS versions 5.0.x avec Proxy Server versions ant\u00e9rieures \u00e0 1.4.2 (2021/12/30)",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTScloud versions c4.5.x et QuTScloud versions c5.0.x avec Proxy Server versions ant\u00e9rieures \u00e0 1.4.2 (2021/12/30)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.0.x avec Proxy Server versions ant\u00e9rieures \u00e0 1.4.3 (2022/01/18)",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-34360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34360"
    }
  ],
  "initial_release_date": "2022-05-27T00:00:00",
  "last_revision_date": "2022-05-27T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-503",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-05-27T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans QNAP Proxy Server. Elle permet \u00e0\nun attaquant de provoquer une injection de requ\u00eates ill\u00e9gitimes par\nrebond (CSRF).\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans QNAP Proxy Server",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-22-18 du 26 mai 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-18"
    }
  ]
}

CERTFR-2022-AVI-421
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap N/A Qnap Photo Station versions antérieures à 6.0.20 (2022/02/15)
Qnap N/A Qnap Photo Station versions antérieures à 5.4.13 (2022/02/11)
Qnap N/A Qnap Photo Station versions antérieures à 5.7.16 (2022/02/11)
Qnap Video Station Qnap Video Station versions antérieures à 5.3.13
Qnap QTS Qnap QTS versions antérieures à 4.5.4.1991 build 20220329
Qnap QTS Qnap QTS versions antérieures à 4.3.4.1976 build 20220303
Qnap N/A Qnap QuTScloud versions antérieures à c5.0.1.1998
Qnap QTS Qnap QTS versions antérieures à 4.2.6 build 20220304
Qnap QTS Qnap QTS versions antérieures à 4.3.3.1945 build 20220303
Qnap QTS Qnap QTS versions antérieures à 5.0.0.1986 build 20220324
Qnap Video Station Qnap Video Station versions antérieures à 5.5.9
Qnap QTS Qnap QTS versions antérieures à 4.3.6.1965 build 20220302
Qnap QVR Qnap QVR versions antérieures à 5.1.6 build 20220401
Qnap Video Station Qnap Video Station versions antérieures à 5.1.8
Qnap QuTS hero Qnap QuTS hero versions antérieures à h5.0.0.1986 build 20220324
Qnap QuTS hero Qnap QuTS hero versions antérieures à h4.5.4.1971 build 20220310

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Qnap Photo Station versions ant\u00e9rieures \u00e0 6.0.20 (2022/02/15)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap Photo Station versions ant\u00e9rieures \u00e0 5.4.13 (2022/02/11)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap Photo Station versions ant\u00e9rieures \u00e0 5.7.16 (2022/02/11)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap Video Station versions ant\u00e9rieures \u00e0 5.3.13",
      "product": {
        "name": "Video Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QTS versions ant\u00e9rieures \u00e0 4.5.4.1991 build 20220329",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QTS versions ant\u00e9rieures \u00e0 4.3.4.1976 build 20220303",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QuTScloud versions ant\u00e9rieures \u00e0 c5.0.1.1998",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QTS versions ant\u00e9rieures \u00e0 4.2.6 build 20220304",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QTS versions ant\u00e9rieures \u00e0 4.3.3.1945 build 20220303",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QTS versions ant\u00e9rieures \u00e0 5.0.0.1986 build 20220324",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap Video Station versions ant\u00e9rieures \u00e0 5.5.9",
      "product": {
        "name": "Video Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QTS versions ant\u00e9rieures \u00e0 4.3.6.1965 build 20220302",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QVR versions ant\u00e9rieures \u00e0 5.1.6 build 20220401",
      "product": {
        "name": "QVR",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap Video Station versions ant\u00e9rieures \u00e0 5.1.8",
      "product": {
        "name": "Video Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QuTS hero versions ant\u00e9rieures \u00e0 h5.0.0.1986 build 20220324",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qnap QuTS hero versions ant\u00e9rieures \u00e0 h4.5.4.1971 build 20220310",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-44056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44056"
    },
    {
      "name": "CVE-2022-44057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44057"
    },
    {
      "name": "CVE-2022-44053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44053"
    },
    {
      "name": "CVE-2022-44052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44052"
    },
    {
      "name": "CVE-2022-44054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44054"
    },
    {
      "name": "CVE-2022-27588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27588"
    },
    {
      "name": "CVE-2022-44055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44055"
    },
    {
      "name": "CVE-2022-38693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38693"
    },
    {
      "name": "CVE-2022-44051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44051"
    }
  ],
  "initial_release_date": "2022-05-06T00:00:00",
  "last_revision_date": "2022-05-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-421",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-05-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-13 du 6 mai 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-13"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-14 du 6 mai 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-14"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-07 du 6 mai 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-07"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-15 du 6 mai 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-15"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-16 du 6 mai 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-16"
    }
  ]
}

CERTFR-2022-AVI-324
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits QNAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QTS QTS versions 4.3.6.x antérieures à 4.3.6.1965 build 20220302
Qnap QuTS hero QuTS hero versions h5.x antérieures à h5.0.0.1986 build 20220324
Qnap QuTS hero QuTS hero versions h4.x antérieures à h4.5.4.1951 build 20220218
Qnap QTS QTS versions 4.3.4.x antérieures à 4.3.4.1976 build 20220303
Qnap N/A QuTScloud versions c5.0.x antérieures à c5.0.1.1949 (ne corrige pas CVE-2022-0847)
Qnap QTS QTS versions 4.3.3.x antérieures à 4.3.3.1945 build 20220303
Qnap QTS QTS versions 4.5.4.x antérieures à 4.5.4.1931 build 20220128
Qnap QTS QTS versions 5.0.x antérieures à 5.0.0.1986 build 20220324
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QTS versions 4.3.6.x ant\u00e9rieures \u00e0 4.3.6.1965 build 20220302",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.x ant\u00e9rieures \u00e0 h5.0.0.1986 build 20220324",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h4.x ant\u00e9rieures \u00e0 h4.5.4.1951 build 20220218",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.3.4.x ant\u00e9rieures \u00e0 4.3.4.1976 build 20220303",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTScloud versions c5.0.x ant\u00e9rieures \u00e0 c5.0.1.1949 (ne corrige pas CVE-2022-0847)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.3.3.x ant\u00e9rieures \u00e0 4.3.3.1945 build 20220303",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.5.4.x ant\u00e9rieures \u00e0 4.5.4.1931 build 20220128",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.0.x ant\u00e9rieures \u00e0 5.0.0.1986 build 20220324",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-44141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44141"
    },
    {
      "name": "CVE-2022-0847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
    },
    {
      "name": "CVE-2022-0336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0336"
    },
    {
      "name": "CVE-2021-44142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44142"
    }
  ],
  "initial_release_date": "2022-04-08T00:00:00",
  "last_revision_date": "2022-04-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-324",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-04-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits QNAP.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits QNAP",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 QNAP QSA-22-03 du 19 mars 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-03"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 QNAP QSA-22-05 du 08 avril 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-05"
    }
  ]
}

CERTFR-2022-AVI-186
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Qnap Proxy Server. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QTS QTS 4.5.x: Proxy Server versions antérieures à 1.4.2
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QTS 4.5.x: Proxy Server versions ant\u00e9rieures \u00e0 1.4.2",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-34361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34361"
    },
    {
      "name": "CVE-2021-34359",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34359"
    }
  ],
  "initial_release_date": "2022-02-25T00:00:00",
  "last_revision_date": "2022-02-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-186",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-02-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Qnap Proxy Server.\nElles permettent \u00e0 un attaquant de provoquer une injection de code\nindirecte \u00e0 distance (XSS).\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Qnap Proxy Server",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-04 du 25 f\u00e9vrier 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-22-04"
    }
  ]
}

CERTFR-2022-AVI-033
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits QNAP. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QTS QTS 4.5.x versions antérieures à 4.5.4.1892 build 20211223
Qnap N/A QcalAgent versions antérieures à 1.1.7
Qnap QVR QVR Pro versions antérieures à 2.1.3.0 du 06/12/2021
Qnap QTS QTS 5.0.x versions antérieures à 5.0.0.1891 build 20211221
Qnap QVR QVR Guard versions antérieures à 2.1.3.0 du 06/12/2021
Qnap QuTS hero QuTS hero versions antérieures à h5.0.0.1892 build 20211222
Qnap QVR QVR Elite versions antérieures à 2.1.4.0 du 06/12/2021

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QTS 4.5.x versions ant\u00e9rieures \u00e0 4.5.4.1892 build 20211223",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QcalAgent versions ant\u00e9rieures \u00e0 1.1.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QVR Pro versions ant\u00e9rieures \u00e0 2.1.3.0 du 06/12/2021",
      "product": {
        "name": "QVR",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS 5.0.x versions ant\u00e9rieures \u00e0 5.0.0.1891 build 20211221",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QVR Guard versions ant\u00e9rieures \u00e0 2.1.3.0 du 06/12/2021",
      "product": {
        "name": "QVR",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions ant\u00e9rieures \u00e0 h5.0.0.1892 build 20211222",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QVR Elite versions ant\u00e9rieures \u00e0 2.1.4.0 du 06/12/2021",
      "product": {
        "name": "QVR",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-38690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38690"
    },
    {
      "name": "CVE-2021-38677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38677"
    },
    {
      "name": "CVE-2021-38691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38691"
    },
    {
      "name": "CVE-2021-38678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38678"
    },
    {
      "name": "CVE-2021-38692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38692"
    },
    {
      "name": "CVE-2021-38689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38689"
    },
    {
      "name": "CVE-2021-38682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38682"
    }
  ],
  "initial_release_date": "2022-01-13T00:00:00",
  "last_revision_date": "2022-01-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-033",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-01-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits QNAP.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance et une injection de code indirecte \u00e0 distance\n(XSS).\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits QNAP",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-57 du 13 janvier 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-57"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-60 du 13 janvier 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-60"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-59 du 13 janvier 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-59"
    }
  ]
}

CERTFR-2022-AVI-009
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits QNAP. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QuTS hero QuTS hero versions antérieures à h4.5.4.1771 du 25/08/2021
Qnap QTS QTS versions antérieures à 4.5.4.1787 du 10/09/2021
Qnap N/A QuTScloud versions antérieures à c4.5.7.1864
Qnap N/A QNAP NAS utilisant QVPN Service versions antérieures à 3.0.760 du 17/12/2021
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QuTS hero versions ant\u00e9rieures \u00e0 h4.5.4.1771 du 25/08/2021",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions ant\u00e9rieures \u00e0 4.5.4.1787 du 10/09/2021",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTScloud versions ant\u00e9rieures \u00e0 c4.5.7.1864",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP NAS utilisant QVPN Service versions ant\u00e9rieures \u00e0 3.0.760 du 17/12/2021",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-38674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38674"
    }
  ],
  "initial_release_date": "2022-01-07T00:00:00",
  "last_revision_date": "2022-01-07T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-009",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-01-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits QNAP.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance et une injection de code indirecte \u00e0 distance\n(XSS).\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits QNAP",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-63 du 7 janvier 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-63"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-61 du 7 janvier 2022",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-61"
    }
  ]
}

CERTFR-2021-AVI-987
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans QNAP QTS. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Qnap QTS QTS versions antérieures à 4.5.4.1787 build 20210910
Qnap QTS QuTS hero versions antérieures à h4.5.4.1771 build 20210825
Qnap QTS QuTScloud versions antérieures à c4.5.7.1864
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QTS versions ant\u00e9rieures \u00e0 4.5.4.1787 build 20210910",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions ant\u00e9rieures \u00e0 h4.5.4.1771 build 20210825",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTScloud versions ant\u00e9rieures \u00e0 c4.5.7.1864",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-34347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34347"
    }
  ],
  "initial_release_date": "2021-12-30T00:00:00",
  "last_revision_date": "2021-12-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-987",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-12-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans QNAP QTS. Elle permet \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans QNAP QTS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 QNAP qsa-21-53 du 30 d\u00e9cembre 2021",
      "url": "https://www.qnap.com/fr-fr/security-advisory/qsa-21-53"
    }
  ]
}