First published: Thu Dec 05 2019(Updated: )
This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions.
Credit: security@qnapsecurity.com.tw security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | =4.3.6.0895 | |
QNAP QTS | =4.3.6.0907 | |
QNAP QTS | =4.3.6.0923 | |
QNAP QTS | =4.3.6.0944 | |
QNAP QTS | =4.3.6.0959 | |
QNAP QTS | =4.3.6.0979 | |
QNAP QTS | =4.3.6.0993 | |
QNAP QTS | =4.3.6.1013 | |
QNAP QTS | =4.3.6.1033 | |
QNAP QTS | =4.4.1.0948-beta | |
QNAP QTS | =4.4.1.0949-beta | |
QNAP QTS | =4.4.1.0978-beta_2 | |
QNAP QTS | =4.4.1.0998-beta_3 | |
QNAP QTS | =4.4.1.0999-beta_3 | |
QNAP QTS | =4.4.1.1031-beta_4 | |
QNAP QTS | =4.4.1.1033-beta_4 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7193 is an improper input validation vulnerability in QNAP QTS.
Remote attackers can exploit CVE-2019-7193 to inject arbitrary code to the system.
CVE-2019-7193 has a severity level of 9.8 (critical).
To fix CVE-2019-7193, QNAP recommends updating QTS to the latest version.
You can find more information about CVE-2019-7193 in the references provided: http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html, https://www.qnap.com/zh-tw/security-advisory/nas-201911-25