First published: Thu Aug 24 2023(Updated: )
A cleartext transmission of sensitive information vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to read the contents of unexpected sensitive data via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QuTS hero h5.1.0.2424 build 20230609 and later
Credit: security@qnapsecurity.com.tw security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | >=5.0.1<5.0.1.2425 | |
QNAP QTS | >=5.1.0<5.1.0.2444 | |
QNAP QuTS hero | >=h5.1.0<h5.1.0.2424 |
We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QuTS hero h5.1.0.2424 build 20230609 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34972 is a cleartext transmission of sensitive information vulnerability that affects QNAP operating systems.
CVE-2023-34972 allows local network clients to read the contents of unexpected sensitive data via unspecified vectors.
The severity of CVE-2023-34972 is medium, with a CVSS score of 6.5.
QNAP QTS versions 5.0.1.2425 and below, QTS versions 5.1.0.2444 and below, and QNAP Quts Hero version h5.1.0.2424 and below are affected by CVE-2023-34972.
To fix CVE-2023-34972, update your QNAP operating system to a version that is not affected by the vulnerability. Please refer to the QNAP Security Advisory QSA-23-58 for more information.