First published: Wed Apr 14 2021(Updated: )
A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS)
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Qnap Surveillance Station | <5.1.5.3.3 | |
Qnap Surveillance Station | >=5.1.5.4.0<5.1.5.4.3 | |
QNAP NAS |
QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS)
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28797 is a stack-based buffer overflow vulnerability that affects QNAP NAS devices running Surveillance Station.
The severity of CVE-2021-28797 is critical with a CVSS score of 9.8.
CVE-2021-28797 allows attackers to execute arbitrary code on QNAP NAS devices running Surveillance Station.
Yes, QNAP has already fixed CVE-2021-28797 in Surveillance Station version 5.1.5.4.3.
You can find more information about CVE-2021-28797 on the QNAP security advisory page at [https://www.qnap.com/en/security-advisory/qsa-21-07](https://www.qnap.com/en/security-advisory/qsa-21-07).