First published: Thu Dec 21 2017(Updated: )
A buffer overflow vulnerability in login function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices.
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <=4.3.3.0378 | |
QNAP QTS | =4.3.4.0358-beta1 | |
QNAP QTS | =4.3.4.0370-beta1 | |
QNAP QTS | =4.3.4.0372-beta1 | |
QNAP QTS | =4.3.4.0374-beta1 | |
QNAP QTS | =4.3.4.0387-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17029 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2017-17029, you should upgrade to QNAP QTS version 4.3.3.0380 or later.
CVE-2017-17029 affects QNAP QTS versions up to and including 4.3.3.0378 and several beta versions.
Yes, CVE-2017-17029 can be exploited remotely without authentication.
The implications of CVE-2017-17029 include the risk of arbitrary code execution, potentially compromising the security of affected NAS devices.