First published: Wed Dec 23 2020(Updated: )
A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later.
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Qnap QES | <2.1.1 | |
Qnap QES | =2.1.1 | |
Qnap QES | =2.1.1-build_20200211 | |
Qnap QES | =2.1.1-build_20200303 | |
Qnap QES | =2.1.1-build_20200319 | |
Qnap QES | =2.1.1-build_20200424 |
QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2499 is considered a high severity vulnerability due to the potential for unauthorized access using a hard-coded password.
To fix CVE-2020-2499, upgrade to QES version 2.1.1 Build 20200515 or later.
CVE-2020-2499 affects all versions of QES prior to version 2.1.1.
If exploited, an attacker could log in to the affected QES system using a hard-coded password, compromising the security of the device.
Yes, QNAP has released an update that resolves CVE-2020-2499 in QES version 2.1.1 Build 20200515 and later.