First published: Thu May 05 2022(Updated: )
A path traversal vulnerability has been reported to affect QNAP device running QuTScloud, QuTS hero, QTS, QVR Pro Appliance. If exploited, this vulnerability allows attackers to read the contents of unexpected files and expose sensitive data. We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero, QTS, QVR Pro Appliance: QuTScloud c5.0.1.1949 and later QuTS hero h5.0.0.1949 build 20220215 and later QuTS hero h4.5.4.1951 build 20220218 and later QTS 5.0.0.1986 build 20220324 and later QTS 4.5.4.1991 build 20220329 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <4.5.4.1991 | |
QNAP QTS | >=5.0.0.1716<5.0.0.1986 | |
QNAP QuTS hero | >=h5.0.0.1772<h5.0.0.1949 | |
QNAP QuTScloud | <c5.0.1.1949 |
We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero, QTS, QVR Pro Appliance: QuTScloud c5.0.1.1949 and later QuTS hero h5.0.0.1949 build 20220215 and later QuTS hero h4.5.4.1951 build 20220218 and later QTS 5.0.0.1986 build 20220324 and later QTS 4.5.4.1991 build 20220329 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38693 is a path traversal vulnerability affecting QNAP devices running QuTScloud, QuTS hero, QTS, QVR Pro Appliance.
CVE-2021-38693 can be exploited by attackers to read the contents of unexpected files and expose sensitive data.
QNAP devices running QuTScloud, QuTS hero, QTS, QVR Pro Appliance are affected by CVE-2021-38693.
CVE-2021-38693 has a severity rating of 5.3 (medium).
To fix CVE-2021-38693, you should install the security patch provided by QNAP. Please refer to the QNAP security advisory for more information.