First published: Fri Nov 22 2024(Updated: )
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <5.2.1.2930 | |
QNAP QuTS hero | <h5.2.1.2929 |
We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-50396 is high due to the potential for remote attackers to exploit it for unauthorized access or memory modification.
To fix CVE-2024-50396, update your QNAP QTS to version 5.2.1.2931 or later, or QuTS hero to version h5.2.1.2930 or later.
CVE-2024-50396 affects QNAP QTS versions up to 5.2.1.2930 and QuTS hero versions up to h5.2.1.2929.
Exploitation of CVE-2024-50396 can lead to unauthorized data access or manipulation of the system's memory.
Yes, QNAP has issued a security advisory detailing CVE-2024-50396 and recommended updates.