First published: Fri Mar 07 2025(Updated: )
An improper neutralization of CRLF sequences ('CRLF Injection') vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to modify application data. We have already fixed the vulnerability in the following versions: QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.2.3.3006 build 20250108 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <5.2.3.3006 | |
QNAP QuTS hero | <5.2.3.3006 |
We have already fixed the vulnerability in the following versions: QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.2.3.3006 build 20250108 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-53693 is critical due to its potential for CRLF Injection, allowing remote attackers to modify application data.
To fix CVE-2024-53693, upgrade your QNAP QTS or QNAP QuTS hero to version 5.2.3.3007 or later.
CVE-2024-53693 affects users of QNAP QTS and QNAP QuTS hero versions up to 5.2.3.3006.
CRLF Injection in CVE-2024-53693 refers to improper handling of Carriage Return and Line Feed characters that can lead to manipulation of application data.
Yes, CVE-2024-53693 can be exploited remotely by attackers who have gained user access to the vulnerable system.