First published: Fri Dec 06 2024(Updated: )
An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to compromise the security of the system. We have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QTS 5.2.2.2950 build 20241114 and later QuTS hero h5.1.9.2954 build 20241120 and later QuTS hero h5.2.2.2952 build 20241116 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <5.1.9.2954 | |
QNAP QTS | <5.2.2.2950 | |
QNAP QuTS hero | <h5.1.9.2954 | |
QNAP QuTS hero | <h5.2.2.2952 |
We have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QTS 5.2.2.2950 build 20241114 and later QuTS hero h5.1.9.2954 build 20241120 and later QuTS hero h5.2.2.2952 build 20241116 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48859 has been rated as a high-severity vulnerability due to its potential to allow remote attackers to compromise system security.
To fix CVE-2024-48859, update your QNAP operating system to the latest version that has patched this vulnerability.
CVE-2024-48859 affects several versions of QNAP QTS and QuTS hero operating systems prior to specific patched versions.
Yes, CVE-2024-48859 can be exploited remotely, allowing attackers to gain unauthorized access to the affected systems.
CVE-2024-48859 is classified as an improper authentication vulnerability.