First published: Tue May 21 2024(Updated: )
An incorrect permission assignment for critical resource vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to read or modify the resource via a network. We have already fixed the vulnerability in the following version: QTS 5.1.7.2770 build 20240520 and later QuTS hero h5.1.7.2770 build 20240520 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | =5.1.0.2348-build_20230325 | |
QNAP QTS | =5.1.0.2399-build_20230515 | |
QNAP QTS | =5.1.0.2418-build_20230603 | |
QNAP QTS | =5.1.0.2444-build_20230629 | |
QNAP QTS | =5.1.0.2466-build_20230721 | |
QNAP QTS | =5.1.1.2491-build_20230815 | |
QNAP QTS | =5.1.2.2533-build_20230926 | |
QNAP QTS | =5.1.3.2578-build_20231110 | |
QNAP QTS | =5.1.4.2596-build_20231128 | |
QNAP QTS | =5.1.5.2645-build_20240116 | |
QNAP QTS | =5.1.5.2679-build_20240219 | |
QNAP QTS | =5.1.6.2722-build_20240402 | |
QNAP QuTS hero | =h5.1.0.2409-build_20230525 | |
QNAP QuTS hero | =h5.1.0.2424-build_20230609 | |
QNAP QuTS hero | =h5.1.0.2453-build_20230708 | |
QNAP QuTS hero | =h5.1.0.2466-build_20230721 | |
QNAP QuTS hero | =h5.1.1.2488-build_20230812 | |
QNAP QuTS hero | =h5.1.2.2534-build_20230927 | |
QNAP QuTS hero | =h5.1.3.2578-build_20231110 | |
QNAP QuTS hero | =h5.1.4.2596-build_20231128 | |
QNAP QuTS hero | =h5.1.5.2647-build_20240118 | |
QNAP QuTS hero | =h5.1.5.2680-build_20240220 | |
QNAP QuTS hero | =h5.1.6.2734-build_20240414 |
We have already fixed the vulnerability in the following version: QTS 5.1.7.2770 build 20240520 and later QuTS hero h5.1.7.2770 build 20240520 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.