CVE-2024-27130Classic Buffer Overflow in Systems INC QTS

Severity
8.8HIGHNVD
CNA7.2VulnCheck7.2
EPSS
81.0%
top 0.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 21

Description

A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute code via a network. We have already fixed the vulnerability in the following version: QTS 5.1.7.2770 build 20240520 and later QuTS hero h5.1.7.2770 build 20240520 and later

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5qnap_systems_inc/quts_heroh5.1.xh5.1.7.2770 build 20240520
NVDqnap/quts_hero11 versions+10
CVEListV5qnap_systems_inc/qts5.1.x5.1.7.2770 build 20240520
NVDqnap/qts12 versions+11

🔴Vulnerability Details

3
GHSA
GHSA-c3mm-2w2h-vx43: A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions2024-05-21
CVEList
QTS, QuTS hero2024-05-21
VulnCheck
QNAP Operating System Authenticated Network Buffer Overflow2024

🕵️Threat Intelligence

1
Bleepingcomputer
QNAP QTS zero-day in Share feature gets public RCE exploit2024-05-20
CVE-2024-27130 — Classic Buffer Overflow | cvebase