First published: Fri Nov 22 2024(Updated: )
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <5.2.1.2930 | |
QNAP QuTS hero | <5.2.1.2929 |
We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50397 is considered a high severity vulnerability due to its potential exploitation by remote attackers.
To fix CVE-2024-50397, update your QNAP QTS to version 5.2.1.2931 or later, or QuTS hero to version 5.2.1.2930 or later.
CVE-2024-50397 affects users of QNAP QTS versions up to 5.2.1.2930 and QuTS hero versions up to 5.2.1.2929.
CVE-2024-50397 can be exploited by remote attackers with user access, allowing them to obtain secret data or modify memory.
There are no known workarounds for CVE-2024-50397, so it is recommended to apply the necessary updates.