First published: Fri Feb 02 2024(Updated: )
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.4.2596 build 20231128 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | =4.5.4.1715-build_20210630 | |
QNAP QTS | =4.5.4.1723-build_20210708 | |
QNAP QTS | =4.5.4.1741-build_20210726 | |
QNAP QTS | =4.5.4.1787-build_20210910 | |
QNAP QTS | =4.5.4.1800-build_20210923 | |
QNAP QTS | =4.5.4.1892-build_20211223 | |
QNAP QTS | =4.5.4.1931-build_20220128 | |
QNAP QTS | =4.5.4.2012-build_20220419 | |
QNAP QTS | =4.5.4.2117-build_20220802 | |
QNAP QTS | =4.5.4.2280-build_20230112 | |
QNAP QTS | =4.5.4.2374-build_20230416 | |
QNAP QTS | =4.5.4.2627 | |
QNAP QTS | =5.1.0.2348-build_20230325 | |
QNAP QTS | =5.1.0.2399-build_20230515 | |
QNAP QTS | =5.1.0.2418-build_20230603 | |
QNAP QTS | =5.1.0.2444-build_20230629 | |
QNAP QTS | =5.1.0.2466-build_20230721 | |
QNAP QTS | =5.1.1.2491-build_20230815 | |
QNAP QTS | =5.1.2.2533-build_20230926 | |
QNAP QTS | =5.1.3.2578-build_20231110 | |
QNAP QTS | =5.1.4.2596 | |
QNAP QuTS hero | =h4.5.4.1771-build_20210825 | |
QNAP QuTS hero | =h4.5.4.1800-build_20210923 | |
QNAP QuTS hero | =h4.5.4.1813-build_20211006 | |
QNAP QuTS hero | =h4.5.4.1848-build_20211109 | |
QNAP QuTS hero | =h4.5.4.1892-build_20211223 | |
QNAP QuTS hero | =h4.5.4.1951-build_20220218 | |
QNAP QuTS hero | =h4.5.4.1971-build_20220310 | |
QNAP QuTS hero | =h4.5.4.1991-build_20220330 | |
QNAP QuTS hero | =h4.5.4.2052-build_20220530 | |
QNAP QuTS hero | =h4.5.4.2138-build_20220824 | |
QNAP QuTS hero | =h4.5.4.2217-build_20221111 | |
QNAP QuTS hero | =h4.5.4.2272-build_20230105 | |
QNAP QuTS hero | =h4.5.4.2374-build_20230417 | |
QNAP QuTS hero | =h4.5.4.2476-build_20230728 | |
QNAP QuTS hero | =h4.5.4.2626 | |
QNAP QuTS hero | =h5.1.0.2409-build_20230525 | |
QNAP QuTS hero | =h5.1.0.2424-build_20230609 | |
QNAP QuTS hero | =h5.1.0.2453-build_20230708 | |
QNAP QuTS hero | =h5.1.0.2466-build_20230721 | |
QNAP QuTS hero | =h5.1.1.2488-build_20230812 | |
QNAP QuTS hero | =h5.1.2.2534-build_20230927 | |
QNAP QuTS hero | =h5.1.3.2578-build_20231110 | |
QNAP QuTS hero | =h5.1.4.2596 | |
QNAP QuTScloud | =c5.1.0.2498-build_20230822 |
We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.4.2596 build 20231128 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-39297 has been classified as high due to its potential to allow authenticated users to execute OS commands remotely.
To fix CVE-2023-39297, it is recommended to update to the latest QTS version where the vulnerability has been patched.
CVE-2023-39297 affects multiple QNAP QTS versions including 4.5.4.x up to 5.1.4.x prior to the fix.
Authenticated users of affected QNAP systems may exploit CVE-2023-39297 to execute arbitrary commands.
Exploiting CVE-2023-39297 could lead to unauthorized command execution, compromising the system's integrity.