First published: Thu Dec 21 2017(Updated: )
A buffer overflow vulnerability in password function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices.
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <=4.3.3.0378 | |
QNAP QTS | =4.3.4.0358-beta1 | |
QNAP QTS | =4.3.4.0370-beta1 | |
QNAP QTS | =4.3.4.0372-beta1 | |
QNAP QTS | =4.3.4.0374-beta1 | |
QNAP QTS | =4.3.4.0387-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17032 is considered a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2017-17032, it is recommended to update QNAP QTS to a version later than 4.3.3.0378.
CVE-2017-17032 affects QNAP QTS versions 4.2.6 build 20171026, 4.3.3.0378 and earlier, as well as beta versions 4.3.4.0358, 4.3.4.0370, 4.3.4.0372, 4.3.4.0374, and 4.3.4.0387.
Yes, CVE-2017-17032 can be exploited remotely by attackers to execute arbitrary code on vulnerable NAS devices.
The potential impacts of CVE-2017-17032 include unauthorized remote access and control over affected QNAP NAS devices.