Severity
7.2HIGH
EPSS
0.1%
top 81.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 2
Latest updateSep 15

Description

A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:LExploitability: 2.3 | Impact: 2.7

Affected Packages6 packages

CVEListV5qnap_systems_inc./quts_heroh5.1.xh5.1.2.2534 build 20230927
CVEListV5qnap_systems_inc./qutscloudc5.x.xc5.1.5.2651
NVDqnap/quts_hero6 versions+5
NVDqnap/qutscloudc5.1.0.2498
CVEListV5qnap_systems_inc./qts5.1.x5.1.2.2533 build 20230926

🔴Vulnerability Details

2
CVEList
QTS, QuTS hero, QuTScloud2024-02-02
GHSA
GHSA-682p-65cm-q45c: A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions2024-02-02

📋Vendor Advisories

12
Red Hat
kernel: wifi: mac80211: check S1G action frame size2025-09-15
Red Hat
kernel: block, bfq: fix uaf for bfqq in bic_set_bfqq()2025-03-27
Red Hat
kernel: OOB Access in smb2_dump_detail2023-12-04
Red Hat
kernel: Out-Of-Bounds Read vulnerability in smbCalcSize2023-12-04
Red Hat
kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl2023-04-17
CVE-2023-41278 (HIGH CVSS 7.2) | A buffer copy without checking size | cvebase.io