First published: Thu Dec 21 2017(Updated: )
A buffer overflow vulnerability in password function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices.
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <=4.3.3.0378 | |
QNAP QTS | =4.3.4.0358-beta1 | |
QNAP QTS | =4.3.4.0370-beta1 | |
QNAP QTS | =4.3.4.0372-beta1 | |
QNAP QTS | =4.3.4.0374-beta1 | |
QNAP QTS | =4.3.4.0387-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17031 is considered a critical vulnerability due to its potential to allow remote code execution on affected QNAP NAS devices.
To fix CVE-2017-17031, users should update their QNAP QTS to the latest version that mitigates the vulnerability.
CVE-2017-17031 affects QNAP QTS versions 4.2.6 build 20171026, 4.3.3.0378 build 20171117, and all 4.3.4 beta versions before 4.3.4.0387.
Yes, CVE-2017-17031 can be exploited remotely, allowing attackers to execute arbitrary code without physical access to the NAS.
CVE-2017-17031 impacts QNAP NAS devices running vulnerable versions of the QTS operating system.