8.8
CWE
120 122
Advisory Published
Updated

CVE-2024-32763: QTS, QuTS hero

First published: Fri Sep 06 2024(Updated: )

A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.8.2823 build 20240712 and later QuTS hero h5.1.8.2823 build 20240712 and later

Credit: security@qnapsecurity.com.tw

Affected SoftwareAffected VersionHow to fix
QNAP QTS=5.1.0.2348-build_20230325
QNAP QTS=5.1.0.2399-build_20230515
QNAP QTS=5.1.0.2418-build_20230603
QNAP QTS=5.1.0.2444-build_20230629
QNAP QTS=5.1.0.2466-build_20230721
QNAP QTS=5.1.1.2491-build_20230815
QNAP QTS=5.1.2.2533-build_20230926
QNAP QTS=5.1.3.2578-build_20231110
QNAP QTS=5.1.4.2596-build_20231128
QNAP QTS=5.1.5.2645-build_20240116
QNAP QTS=5.1.5.2679-build_20240219
QNAP QTS=5.1.6.2722-build_20240402
QNAP QTS=5.1.7.2770-build_20240520
QNAP QuTS hero=h5.1.0.2409-build_20230525
QNAP QuTS hero=h5.1.0.2424-build_20230609
QNAP QuTS hero=h5.1.0.2453-build_20230708
QNAP QuTS hero=h5.1.0.2466-build_20230721
QNAP QuTS hero=h5.1.1.2488-build_20230812
QNAP QuTS hero=h5.1.2.2534-build_20230927
QNAP QuTS hero=h5.1.3.2578-build_20231110
QNAP QuTS hero=h5.1.4.2596-build_20231128
QNAP QuTS hero=h5.1.5.2647-build_20240118
QNAP QuTS hero=h5.1.5.2680-build_20240220
QNAP QuTS hero=h5.1.6.2734-build_20240414
QNAP QuTS hero=h5.1.7.2770-build_20240520
QNAP QuTS hero=h5.1.7.2788-build_20240607
QNAP QuTS hero=h5.1.7.2794-build_20240613

Remedy

We have already fixed the vulnerability in the following versions: QTS 5.1.8.2823 build 20240712 and later QuTS hero h5.1.8.2823 build 20240712 and later

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-32763?

    The severity of CVE-2024-32763 is considered high due to the potential for authenticated users to execute arbitrary code via a network.

  • How do I fix CVE-2024-32763?

    To fix CVE-2024-32763, update your QNAP operating system to the latest version that addresses this vulnerability.

  • What versions of QNAP are affected by CVE-2024-32763?

    CVE-2024-32763 affects various versions of QNAP QTS and QuTS hero, specifically those prior to the fixed builds mentioned in the advisory.

  • Can CVE-2024-32763 be exploited remotely?

    Yes, CVE-2024-32763 can be exploited over the network, allowing attackers to execute code if they have authenticated access.

  • Is CVE-2024-32763 related to any specific QNAP products?

    CVE-2024-32763 is related to multiple QNAP operating system versions, impacting devices reliant on the QNAP QTS and QuTS hero environments.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203