CVE-2021-28815
Vulnerability from cvelistv5
Published
2021-06-16 04:00
Modified
2024-09-17 01:16
Severity ?
EPSS score ?
Summary
Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link versions prior to 2.2.21 on QTS 4.5.3; versions prior to 2.2.21 on QuTS hero h4.5.2; versions prior to 2.2.21 on QuTScloud c4.5.4.
References
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | QNAP Systems Inc. | myQNAPcloud Link |
Version: unspecified < 2.2.21 |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:55:11.489Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-26" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "QTS 4.5.3" ], "product": "myQNAPcloud Link", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "2.2.21", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "QuTS hero h4.5.2" ], "product": "myQNAPcloud Link", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "2.2.21", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "QuTScloud c4.5.4" ], "product": "myQNAPcloud Link", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "2.2.21", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "CJ Fairhead" } ], "datePublic": "2021-06-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link versions prior to 2.2.21 on QTS 4.5.3; versions prior to 2.2.21 on QuTS hero h4.5.2; versions prior to 2.2.21 on QuTScloud c4.5.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-16T04:00:11", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-26" } ], "solutions": [ { "lang": "en", "value": "QNAP have already fixed this vulnerability in the following versions of myQNAPcloud Link:\n\nQTS 4.5.3: myQNAPcloud Link 2.2.21 and later\nQuTS hero h4.5.2: myQNAPcloud Link 2.2.21 and later\nQuTScloud c4.5.4: myQNAPcloud Link 2.2.21 and later" } ], "source": { "advisory": "QSA-21-26", "discovery": "EXTERNAL" }, "title": "Insecure Storage of Sensitive Information in myQNAPcloud Link", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2021-06-16T00:32:00.000Z", "ID": "CVE-2021-28815", "STATE": "PUBLIC", "TITLE": "Insecure Storage of Sensitive Information in myQNAPcloud Link" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "myQNAPcloud Link", "version": { "version_data": [ { "platform": "QTS 4.5.3", "version_affected": "\u003c", "version_value": "2.2.21" }, { "platform": "QuTS hero h4.5.2", "version_affected": "\u003c", "version_value": "2.2.21" }, { "platform": "QuTScloud c4.5.4", "version_affected": "\u003c", "version_value": "2.2.21" } ] } } ] }, "vendor_name": "QNAP Systems Inc." } ] } }, "credit": [ { "lang": "eng", "value": "CJ Fairhead" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link versions prior to 2.2.21 on QTS 4.5.3; versions prior to 2.2.21 on QuTS hero h4.5.2; versions prior to 2.2.21 on QuTScloud c4.5.4." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-922 Insecure Storage of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-26", "refsource": "MISC", "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-26" } ] }, "solution": [ { "lang": "en", "value": "QNAP have already fixed this vulnerability in the following versions of myQNAPcloud Link:\n\nQTS 4.5.3: myQNAPcloud Link 2.2.21 and later\nQuTS hero h4.5.2: myQNAPcloud Link 2.2.21 and later\nQuTScloud c4.5.4: myQNAPcloud Link 2.2.21 and later" } ], "source": { "advisory": "QSA-21-26", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2021-28815", "datePublished": "2021-06-16T04:00:11.639822Z", "dateReserved": "2021-03-18T00:00:00", "dateUpdated": "2024-09-17T01:16:56.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-28815\",\"sourceIdentifier\":\"security@qnapsecurity.com.tw\",\"published\":\"2021-06-16T04:15:08.530\",\"lastModified\":\"2024-11-21T06:00:15.340\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link versions prior to 2.2.21 on QTS 4.5.3; versions prior to 2.2.21 on QuTS hero h4.5.2; versions prior to 2.2.21 on QuTScloud c4.5.4.\"},{\"lang\":\"es\",\"value\":\"Se ha reportado de que el almacenamiento no seguro de informaci\u00f3n confidencial afecta a los NAS de QNAP que ejecutan myQNAPcloud Link. Si es explotado, esta vulnerabilidad permite a atacantes remotos leer informaci\u00f3n confidencial accediendo al mecanismo de almacenamiento sin restricciones. Este problema afecta a: Versiones de myQNAPcloud Link de QNAP Systems Inc. anteriores a 2.2.21 en QTS versiones 4.5.3; versiones anteriores a 2.2.21 en QuTS hero versiones h4.5.2; versiones anteriores a 2.2.21 en QuTScloud versiones c4.5.4\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@qnapsecurity.com.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.5,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@qnapsecurity.com.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-922\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qnap:myqnapcloud_link:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.2.21\",\"matchCriteriaId\":\"4FD423D3-82BD-40C5-9023-08A9DD66AACB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:qnap:qts:4.5.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F4E5174-441F-4ABA-8D4F-5040E99AEBA0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:qnap:quts_hero:h4.5.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8ED5973-0C2C-44ED-8A9C-4669C46F00BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:qnap:qutscloud:c4.5.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E83E97A-D58A-44E2-A2EA-8159836A5AFE\"}]}]}],\"references\":[{\"url\":\"https://www.qnap.com/zh-tw/security-advisory/qsa-21-26\",\"source\":\"security@qnapsecurity.com.tw\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.qnap.com/zh-tw/security-advisory/qsa-21-26\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.