First published: Fri Oct 16 2015(Updated: )
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <=4.1.4 | |
QNAP QTS | <=4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6003 is classified as a high-severity vulnerability due to its potential to allow unauthorized file access.
To fix CVE-2015-6003, update your QNAP QTS to version 4.1.4 build 0910 or higher, or 4.2.0 RC2 build 0910 or higher.
CVE-2015-6003 can be exploited by remote attackers to read or write arbitrary files when AFP is enabled.
CVE-2015-6003 affects QNAP QTS versions prior to 4.1.4 build 0910 and 4.2.x versions prior to 4.2.0 RC2 build 0910.
Users of QNAP QTS with AFP enabled, specifically those with OS X user or guest accounts, are impacted by CVE-2015-6003.