First published: Fri Mar 07 2025(Updated: )
A time-of-check time-of-use (TOCTOU) race condition vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local attackers who have gained user access to gain access to otherwise unauthorized resources. We have already fixed the vulnerability in the following versions: QVPN Device Client for Mac 2.2.5 and later Qsync for Mac 5.1.3 and later Qfinder Pro Mac 7.11.1 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QVPN Device Client | <2.2.5 | |
QNAP Qsync | <5.1.3 | |
QNAP Qfinder Pro | <7.11.1 |
We have already fixed the vulnerability in the following versions: QVPN Device Client for Mac 2.2.5 and later Qsync for Mac 5.1.3 and later Qfinder Pro Mac 7.11.1 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53694 has been classified as a moderate severity vulnerability due to the potential unauthorized access it allows local attackers.
To fix CVE-2024-53694, upgrade the affected software to the latest version as recommended in the security advisory.
CVE-2024-53694 affects QNAP QVPN Device Client versions prior to 2.2.5, Qsync versions prior to 5.1.3, and Qfinder Pro versions prior to 7.11.1.
CVE-2024-53694 is a time-of-check time-of-use (TOCTOU) race condition vulnerability.
No, CVE-2024-53694 can only be exploited by local attackers who already have user access.