First published: Fri Mar 07 2025(Updated: )
A server-side request forgery (SSRF) vulnerability has been reported to affect QuLog Center. If exploited, the vulnerability could allow remote attackers who have gained administrator access to read application data. We have already fixed the vulnerability in the following versions: QuLog Center 1.7.0.829 ( 2024/10/01 ) and later QuLog Center 1.8.0.888 ( 2024/10/15 ) and later QTS 4.5.4.2957 build 20241119 and later QuTS hero h4.5.4.2956 build 20241119 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QuLog Center | <1.7.0.829 | |
QNAP QTS | <4.5.4.2957 | |
QNAP QuTS hero | <h4.5.4.2956 |
We have already fixed the vulnerability in the following versions: QuLog Center 1.7.0.829 ( 2024/10/01 ) and later QuLog Center 1.8.0.888 ( 2024/10/15 ) and later QTS 4.5.4.2957 build 20241119 and later QuTS hero h4.5.4.2956 build 20241119 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53696 has been classified as a high severity vulnerability.
To fix CVE-2024-53696, update QuLog Center to version 1.7.0.829 or later, or ensure that QTS and QuTS hero are updated to the latest versions.
CVE-2024-53696 is a server-side request forgery (SSRF) vulnerability.
CVE-2024-53696 affects users who have administrator access to vulnerable versions of QuLog Center, QTS, and QuTS hero.
If exploited, CVE-2024-53696 allows remote attackers to read application data.