CVE-2021-44051 (GCVE-0-2021-44051)

Vulnerability from cvelistv5 – Published: 2022-05-05 16:50 – Updated: 2024-09-16 17:43
VLAI?
Title
Command injection
Summary
A command injection vulnerability has been reported to affect QNAP NAS running QuTScloud, QuTS hero and QTS. If exploited, this vulnerability allows remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero and QTS: QuTScloud c5.0.1.1949 and later QuTS hero h5.0.0.1986 build 20220324 and later QTS 5.0.0.1986 build 20220324 and later
CWE
Assigner
References
Impacted products
Vendor Product Version
QNAP Systems Inc. QuTScloud Affected: unspecified , < c5.0.1.1949 (custom)
Create a notification for this product.
    QNAP Systems Inc. QuTS hero Affected: unspecified , < h5.0.0.1986 build 20220324 (custom)
Create a notification for this product.
    QNAP Systems Inc. QTS Affected: unspecified , < 5.0.0.1986 build 20220324 (custom)
Create a notification for this product.
Date Public ?
2022-05-06 00:00
Credits
Enio Pena Navarro and Michael Messner from Siemens Energy AG
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T04:10:17.275Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.qnap.com/en/security-advisory/qsa-22-16"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "QuTScloud",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "c5.0.1.1949",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "QuTS hero",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "h5.0.0.1986 build 20220324",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "QTS",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "5.0.0.1986 build 20220324",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Enio Pena Navarro and Michael Messner from Siemens Energy AG"
        }
      ],
      "datePublic": "2022-05-06T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A command injection vulnerability has been reported to affect QNAP NAS running QuTScloud, QuTS hero and QTS. If exploited, this vulnerability allows remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero and QTS: QuTScloud c5.0.1.1949 and later QuTS hero h5.0.0.1986 build 20220324 and later QTS 5.0.0.1986 build 20220324 and later"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-05T16:50:20.000Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.qnap.com/en/security-advisory/qsa-22-16"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero and QTS:\nQuTScloud c5.0.1.1949 and later\nQuTS hero h5.0.0.1986 build 20220324 and later\nQTS 5.0.0.1986 build 20220324 and later"
        }
      ],
      "source": {
        "advisory": "QSA-22-16",
        "discovery": "EXTERNAL"
      },
      "title": "Command injection",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@qnap.com",
          "DATE_PUBLIC": "2022-05-06T00:00:00.000Z",
          "ID": "CVE-2021-44051",
          "STATE": "PUBLIC",
          "TITLE": "Command injection"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "QuTScloud",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "c5.0.1.1949"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "QuTS hero",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "h5.0.0.1986 build 20220324"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "QTS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "5.0.0.1986 build 20220324"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "QNAP Systems Inc."
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Enio Pena Navarro and Michael Messner from Siemens Energy AG"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A command injection vulnerability has been reported to affect QNAP NAS running QuTScloud, QuTS hero and QTS. If exploited, this vulnerability allows remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero and QTS: QuTScloud c5.0.1.1949 and later QuTS hero h5.0.0.1986 build 20220324 and later QTS 5.0.0.1986 build 20220324 and later"
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-77"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.qnap.com/en/security-advisory/qsa-22-16",
              "refsource": "MISC",
              "url": "https://www.qnap.com/en/security-advisory/qsa-22-16"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero and QTS:\nQuTScloud c5.0.1.1949 and later\nQuTS hero h5.0.0.1986 build 20220324 and later\nQTS 5.0.0.1986 build 20220324 and later"
          }
        ],
        "source": {
          "advisory": "QSA-22-16",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2021-44051",
    "datePublished": "2022-05-05T16:50:20.575Z",
    "dateReserved": "2021-11-19T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:43:45.081Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2021-44051",
      "date": "2026-05-07",
      "epss": "0.01155",
      "percentile": "0.78655"
    },
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qnap:qts:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.0.0.1716\", \"versionEndExcluding\": \"5.0.0.1986\", \"matchCriteriaId\": \"0014CC59-E631-4F43-8217-F10C2EB3AEAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.3.3.0174\", \"versionEndExcluding\": \"4.3.3.1945\", \"matchCriteriaId\": \"9E5D1B6F-854F-4D93-B78C-5BAEC46EE64B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.3.4.0899\", \"versionEndExcluding\": \"4.3.4.1976\", \"matchCriteriaId\": \"C2AFDF21-2B1F-49BE-9120-FA2A574B565A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.3.6.0895\", \"versionEndExcluding\": \"4.3.6.1965\", \"matchCriteriaId\": \"41D108D1-72B7-4503-8438-64C486E85256\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.4.0.0883\", \"versionEndExcluding\": \"4.5.4.1991\", \"matchCriteriaId\": \"ACBE4C2B-CA91-43F4-9BCC-9C8FA83306C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:4.2.6:build_20170517:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F523E9F-D101-4C29-A624-74E1F3F8CB7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:4.2.6:build_20190322:*:*:*:*:*:*\", \"matchCriteriaId\": \"1388DBE0-F6BB-44AB-81AC-BFB4E70BE820\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:4.2.6:build_20190730:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF3C4461-C1B6-43A1-BA5E-D6658EFD06EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:4.2.6:build_20190921:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1F11848-6FED-4D58-A177-36D280C0347C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:4.2.6:build_20191107:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6259C86-FFDA-40E8-AF0C-33CC8C108DC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:4.2.6:build_20200109:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E01E157-BDF1-4B00-BA9B-6887C0C7DFF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:4.2.6:build_20200421:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D1E5368-9587-4E0A-BB65-D88069CA8490\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:4.2.6:build_20200611:*:*:*:*:*:*\", \"matchCriteriaId\": \"B63CE419-871C-4866-8AB1-4BB6461E1D74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:4.2.6:build_20200821:*:*:*:*:*:*\", \"matchCriteriaId\": \"886A71D1-9615-47A5-B3C2-CBC6F02961A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:4.2.6:build_20210327:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B7A506C-1F53-4CEC-9828-9327352DE153\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:4.2.6:build_20211215:*:*:*:*:*:*\", \"matchCriteriaId\": \"060D81A5-599A-4329-99C8-D69725C65AF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"h4.5.4.1771\", \"matchCriteriaId\": \"2B57DE98-C9C6-4C4D-B790-293D6D0CE646\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"h5.0.0.1772\", \"versionEndExcluding\": \"h5.0.0.1986\", \"matchCriteriaId\": \"306566D1-559C-426B-B208-37C2C248239C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"c5.0.1.1998\", \"matchCriteriaId\": \"F983E154-D65D-4037-B43E-94C6DB86F24E\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A command injection vulnerability has been reported to affect QNAP NAS running QuTScloud, QuTS hero and QTS. If exploited, this vulnerability allows remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero and QTS: QuTScloud c5.0.1.1949 and later QuTS hero h5.0.0.1986 build 20220324 and later QTS 5.0.0.1986 build 20220324 and later\"}, {\"lang\": \"es\", \"value\": \"Se ha informado de una vulnerabilidad de inyecci\\u00f3n de comandos que afecta a los NAS de QNAP que ejecutan QuTScloud, QuTS hero y QTS. Si es explotada, esta vulnerabilidad permite a atacantes remotos ejecutar comandos arbitrarios. Ya hemos corregido esta vulnerabilidad en las siguientes versiones de QuTScloud, QuTS hero y QTS: QuTScloud c5.0.1.1949 y posteriores QuTS hero h5.0.0.1986 build 20220324 y posteriores QTS 5.0.0.1986 build 20220324 y posteriores\"}]",
      "id": "CVE-2021-44051",
      "lastModified": "2024-11-21T06:30:18.263",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@qnapsecurity.com.tw\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2022-05-05T17:15:10.160",
      "references": "[{\"url\": \"https://www.qnap.com/en/security-advisory/qsa-22-16\", \"source\": \"security@qnapsecurity.com.tw\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.qnap.com/en/security-advisory/qsa-22-16\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@qnapsecurity.com.tw",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"security@qnapsecurity.com.tw\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-77\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-77\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-44051\",\"sourceIdentifier\":\"security@qnapsecurity.com.tw\",\"published\":\"2022-05-05T17:15:10.160\",\"lastModified\":\"2024-11-21T06:30:18.263\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A command injection vulnerability has been reported to affect QNAP NAS running QuTScloud, QuTS hero and QTS. If exploited, this vulnerability allows remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero and QTS: QuTScloud c5.0.1.1949 and later QuTS hero h5.0.0.1986 build 20220324 and later QTS 5.0.0.1986 build 20220324 and later\"},{\"lang\":\"es\",\"value\":\"Se ha informado de una vulnerabilidad de inyecci\u00f3n de comandos que afecta a los NAS de QNAP que ejecutan QuTScloud, QuTS hero y QTS. Si es explotada, esta vulnerabilidad permite a atacantes remotos ejecutar comandos arbitrarios. Ya hemos corregido esta vulnerabilidad en las siguientes versiones de QuTScloud, QuTS hero y QTS: QuTScloud c5.0.1.1949 y posteriores QuTS hero h5.0.0.1986 build 20220324 y posteriores QTS 5.0.0.1986 build 20220324 y posteriores\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@qnapsecurity.com.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@qnapsecurity.com.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qnap:qts:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.0.1716\",\"versionEndExcluding\":\"5.0.0.1986\",\"matchCriteriaId\":\"0014CC59-E631-4F43-8217-F10C2EB3AEAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3.3.0174\",\"versionEndExcluding\":\"4.3.3.1945\",\"matchCriteriaId\":\"9E5D1B6F-854F-4D93-B78C-5BAEC46EE64B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3.4.0899\",\"versionEndExcluding\":\"4.3.4.1976\",\"matchCriteriaId\":\"C2AFDF21-2B1F-49BE-9120-FA2A574B565A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3.6.0895\",\"versionEndExcluding\":\"4.3.6.1965\",\"matchCriteriaId\":\"41D108D1-72B7-4503-8438-64C486E85256\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.4.0.0883\",\"versionEndExcluding\":\"4.5.4.1991\",\"matchCriteriaId\":\"ACBE4C2B-CA91-43F4-9BCC-9C8FA83306C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.2.6:build_20170517:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F523E9F-D101-4C29-A624-74E1F3F8CB7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.2.6:build_20190322:*:*:*:*:*:*\",\"matchCriteriaId\":\"1388DBE0-F6BB-44AB-81AC-BFB4E70BE820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.2.6:build_20190730:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF3C4461-C1B6-43A1-BA5E-D6658EFD06EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.2.6:build_20190921:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F11848-6FED-4D58-A177-36D280C0347C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.2.6:build_20191107:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6259C86-FFDA-40E8-AF0C-33CC8C108DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.2.6:build_20200109:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E01E157-BDF1-4B00-BA9B-6887C0C7DFF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.2.6:build_20200421:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D1E5368-9587-4E0A-BB65-D88069CA8490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.2.6:build_20200611:*:*:*:*:*:*\",\"matchCriteriaId\":\"B63CE419-871C-4866-8AB1-4BB6461E1D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.2.6:build_20200821:*:*:*:*:*:*\",\"matchCriteriaId\":\"886A71D1-9615-47A5-B3C2-CBC6F02961A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.2.6:build_20210327:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B7A506C-1F53-4CEC-9828-9327352DE153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.2.6:build_20211215:*:*:*:*:*:*\",\"matchCriteriaId\":\"060D81A5-599A-4329-99C8-D69725C65AF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"h4.5.4.1771\",\"matchCriteriaId\":\"2B57DE98-C9C6-4C4D-B790-293D6D0CE646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"h5.0.0.1772\",\"versionEndExcluding\":\"h5.0.0.1986\",\"matchCriteriaId\":\"306566D1-559C-426B-B208-37C2C248239C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"c5.0.1.1998\",\"matchCriteriaId\":\"F983E154-D65D-4037-B43E-94C6DB86F24E\"}]}]}],\"references\":[{\"url\":\"https://www.qnap.com/en/security-advisory/qsa-22-16\",\"source\":\"security@qnapsecurity.com.tw\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.qnap.com/en/security-advisory/qsa-22-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…