First published: Thu Aug 24 2023(Updated: )
An inadequate encryption strength vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to decrypt the data using brute force attacks via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later
Credit: security@qnapsecurity.com.tw security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | >=4.5.4<4.5.4.2467 | |
QNAP QTS | >=5.0.1<5.0.1.2425 | |
QNAP QTS | >=5.1.0<5.1.0.2444 | |
QNAP QuTS hero | >=h4.5.4<h4.5.4.2476 | |
QNAP QuTS hero | >=h5.1.0<h5.1.0.2424 |
We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this QNAP operating system vulnerability is CVE-2023-34971.
The severity of CVE-2023-34971 is high with a CVSS score of 8.8.
QNAP QTS versions 4.5.4.2467 to 4.5.4.2476 and versions 5.0.1.2425 to 5.1.0.2444, as well as Qnap Quts Hero versions h4.5.4.2476 to h5.1.0.2424, are affected by CVE-2023-34971.
If exploited, the vulnerability allows local network clients to decrypt the data using brute force attacks.
To fix CVE-2023-34971, it is recommended to update to the fixed versions provided by QNAP.