First published: Fri Sep 06 2024(Updated: )
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 4.5.4.2790 build 20240605 and later QuTS hero h4.5.4.2790 build 20240606 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | =4.5.4.1715-build_20210630 | |
QNAP QTS | =4.5.4.1723-build_20210708 | |
QNAP QTS | =4.5.4.1741-build_20210726 | |
QNAP QTS | =4.5.4.1787-build_20210910 | |
QNAP QTS | =4.5.4.1800-build_20210923 | |
QNAP QTS | =4.5.4.1892-build_20211223 | |
QNAP QTS | =4.5.4.1931-build_20220128 | |
QNAP QTS | =4.5.4.2012-build_20220419 | |
QNAP QTS | =4.5.4.2117-build_20220802 | |
QNAP QTS | =4.5.4.2280-build_20230112 | |
QNAP QTS | =4.5.4.2374-build_20230416 | |
QNAP QTS | =4.5.4.2467-build_20230718 | |
QNAP QTS | =4.5.4.2627-build_20231225 | |
QNAP QuTS hero | =h4.5.4.1771-build_20210825 | |
QNAP QuTS hero | =h4.5.4.1800-build_20210923 | |
QNAP QuTS hero | =h4.5.4.1813-build_20211006 | |
QNAP QuTS hero | =h4.5.4.1848-build_20211109 | |
QNAP QuTS hero | =h4.5.4.1892-build_20211223 | |
QNAP QuTS hero | =h4.5.4.1951-build_20220218 | |
QNAP QuTS hero | =h4.5.4.1971-build_20220310 | |
QNAP QuTS hero | =h4.5.4.1991-build_20220330 | |
QNAP QuTS hero | =h4.5.4.2052-build_20220530 | |
QNAP QuTS hero | =h4.5.4.2138-build_20220824 | |
QNAP QuTS hero | =h4.5.4.2217-build_20221111 | |
QNAP QuTS hero | =h4.5.4.2272-build_20230105 | |
QNAP QuTS hero | =h4.5.4.2374-build_20230417 | |
QNAP QuTS hero | =h4.5.4.2476-build_20230728 | |
QNAP QuTS hero | =h4.5.4.2626-build_20231225 |
We have already fixed the vulnerability in the following versions: QTS 4.5.4.2790 build 20240605 and later QuTS hero h4.5.4.2790 build 20240606 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.