First published: Mon Aug 25 2014(Updated: )
QNAP TS-469U with firmware 4.0.7 Build 20140410, TS-459U, TS-EC1679U-RP, and SS-839 use world-readable permissions for /etc/config/shadow, which allows local users to obtain usernames and hashed passwords by reading the password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Qnap TS-469U Firmware | =4.0.7 | |
Qnap TS-469U Firmware | ||
Qnap TS-EC1679U-RP | =4.0.7 | |
QNAP TS-EC1679U-RP | ||
Qnap TS-459U | =4.0.7 | |
QNAP TS-459U Firmware | ||
Qnap SS-839 | =4.0.7 | |
QNAP SS-839 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5457 is classified as a high-severity vulnerability due to its potential to expose sensitive user information.
To fix CVE-2014-5457, ensure that the permissions for the /etc/config/shadow file are set to prevent world-readable access.
CVE-2014-5457 affects QNAP TS-469U, TS-459U, TS-EC1679U-RP, and SS-839 models running firmware version 4.0.7.
Yes, local users can exploit CVE-2014-5457 to read usernames and hashed passwords from the vulnerable system.
CVE-2014-5457 poses a risk only to devices running the affected firmware version, so updating to a patched version will mitigate the threat.