First published: Fri Dec 08 2023(Updated: )
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2514 build 20230906 and later QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.2.2534 build 20230927 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | =5.1.0.2348-build_20230325 | |
QNAP QTS | =5.1.0.2399-build_20230515 | |
QNAP QTS | =5.1.0.2418-build_20230603 | |
QNAP QTS | =5.1.0.2444-build_20230629 | |
QNAP QTS | =5.1.0.2466-build_20230721 | |
QNAP QTS | =5.1.1.2491-build_20230815 | |
QNAP QTS | =5.0.1.2034-build_20220515 | |
QNAP QTS | =5.0.1.2079-build_20220629 | |
QNAP QTS | =5.0.1.2131-build_20220820 | |
QNAP QTS | =5.0.1.2137-build_20220826 | |
QNAP QTS | =5.0.1.2145-build_20220903 | |
QNAP QTS | =5.0.1.2173-build_20221001 | |
QNAP QTS | =5.0.1.2194-build_20221022 | |
QNAP QTS | =5.0.1.2234-build_20221201 | |
QNAP QTS | =5.0.1.2248-build_20221215 | |
QNAP QTS | =5.0.1.2277-build_20230112 | |
QNAP QTS | =5.0.1.2346-build_20230322 | |
QNAP QTS | =5.0.1.2376-build_20230421 | |
QNAP QTS | =5.0.1.2425-build_20230609 | |
QNAP QuTS hero | =h5.1.0.2409-build_20230525 | |
QNAP QuTS hero | =h5.1.0.2424-build_20230609 | |
QNAP QuTS hero | =h5.1.0.2453-build_20230708 | |
QNAP QuTS hero | =h5.1.0.2466-build_20230721 | |
QNAP QuTS hero | =h5.1.1.2488-build_20230812 | |
QNAP QuTS hero | =h5.0.1.2045-build_20220526 | |
QNAP QuTS hero | =h5.0.1.2192-build_20221020 | |
QNAP QuTS hero | =h5.0.1.2248-build_20221215 | |
QNAP QuTS hero | =h5.0.1.2269-build_20230104 | |
QNAP QuTS hero | =h5.0.1.2277-build_20230112 | |
QNAP QuTS hero | =h5.0.1.2348-build_20230324 | |
QNAP QuTS hero | =h5.0.1.2376-build_20230421 |
We have already fixed the vulnerability in the following versions: QTS 5.0.1.2514 build 20230906 and later QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.2.2534 build 20230927 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32968 is considered a high-severity vulnerability due to the potential for authenticated administrators to execute arbitrary code via a network.
To fix CVE-2023-32968, update your QNAP operating system to a patched version as recommended by QNAP.
CVE-2023-32968 affects multiple QNAP QTS and QuTS hero versions, including builds from 5.0.1.2034 up to 5.1.1.2491.
Yes, CVE-2023-32968 can be exploited remotely if the attacker has authenticated access as an administrator.
CVE-2023-32968 is classified as a buffer copy without proper size checking vulnerability.