First published: Fri Sep 22 2023(Updated: )
A buffer copy without checking size of input vulnerability has been reported to affect QNAP operating system. If exploited, the vulnerability possibly allows remote users to execute code via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 4.3.6.2441 build 20230621 and later QTS 4.3.3.2420 build 20230621 and later QTS 4.2.6 build 20230621 and later QTS 4.3.4.2451 build 20230621 and later
Credit: security@qnapsecurity.com.tw security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | >=4.3.3<4.3.3.2420 | |
QNAP QTS | >=4.3.4<4.3.4.245 | |
QNAP QTS | >=4.3.6<4.3.6.2441 |
We have already fixed the vulnerability in the following versions: QTS 4.3.6.2441 build 20230621 and later QTS 4.3.3.2420 build 20230621 and later QTS 4.2.6 build 20230621 and later QTS 4.3.4.2451 build 20230621 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-23363.
The QNAP operating system is affected by this vulnerability.
The severity of CVE-2023-23363 is critical with a score of 9.8.
If exploited, the vulnerability allows remote users to execute code via unspecified vectors.
Yes, the vulnerability has been fixed in QTS 4.3.6.2441 and later versions.