First published: Fri Feb 02 2024(Updated: )
An incorrect permission assignment for critical resource vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow authenticated users to read or modify the resource via a network. We have already fixed the vulnerability in the following versions: Qsync Central 4.4.0.15 ( 2024/01/04 ) and later Qsync Central 4.3.0.11 ( 2024/01/11 ) and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Qnap Qsync Central | >=4.3.0.0<4.3.0.11 | |
Qnap Qsync Central | >=4.4.0.0<4.4.0.15 |
We have already fixed the vulnerability in the following versions: Qsync Central 4.4.0.15 ( 2024/01/04 ) and later Qsync Central 4.3.0.11 ( 2024/01/11 ) and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47564 is considered a critical vulnerability due to the potential for authenticated users to exploit incorrect permission assignments.
To fix CVE-2023-47564, update Qsync Central to a patched version that is higher than 4.4.0.15 or 4.3.0.11 as provided in the security advisory.
CVE-2023-47564 affects critical resources in Qsync Central that can be read or modified by authenticated users.
Authenticated users of Qsync Central are at risk of being able to read or modify sensitive resources due to CVE-2023-47564.
Qsync Central versions between 4.3.0.0 and 4.3.0.11 and versions between 4.4.0.0 and 4.4.0.15 are vulnerable to CVE-2023-47564.