First published: Thu Dec 10 2020(Updated: )
If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QANP have already fixed these vulnerabilities in the following versions of QTS and QuTS hero. QuTS hero h4.5.1.1472 build 20201031 and later QTS 4.5.1.1456 build 20201015 and later QTS 4.4.3.1354 build 20200702 and later QTS 4.3.6.1333 build 20200608 and later QTS 4.3.4.1368 build 20200703 and later QTS 4.3.3.1315 build 20200611 and later QTS 4.2.6 build 20200611 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QuTS hero | <4.5.1.1472 | |
QNAP QTS | <4.5.1.1456 | |
QNAP QTS | <4.4.3.1354 | |
QNAP QTS | <4.3.6.1333 | |
QNAP QTS | <4.3.4.1368 | |
QNAP QTS | <4.3.3.1315 | |
QNAP QTS | <4.2.6 |
QNAP have already fixed these vulnerabilities in the following versions of QTS and QuTS hero. QuTS hero h4.5.1.1472 build 20201031 and later QTS 4.5.1.1456 build 20201015 and later QTS 4.4.3.1354 build 20200702 and later QTS 4.3.6.1333 build 20200608 and later QTS 4.3.4.1368 build 20200703 and later QTS 4.3.3.1315 build 20200611 and later QTS 4.2.6 build 20200611 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2495 is classified as a cross-site scripting vulnerability that poses a significant risk to the affected QNAP systems.
To fix CVE-2020-2495, upgrade your QNAP device to QTS version 4.5.1.1456 or later, or QuTS hero version 4.5.1.1472 or later.
CVE-2020-2495 affects versions of QNAP QTS prior to 4.5.1.1456 and QuTS hero prior to 4.5.1.1472.
Yes, if exploited, CVE-2020-2495 could allow remote attackers to inject malicious code, potentially leading to data exposure or corruption.
Monitoring logs for unusual access patterns and implementing web application firewalls can help detect attempts to exploit CVE-2020-2495.