First published: Fri Mar 07 2025(Updated: )
A double free vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.2.3.3006 build 20250108 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <5.2.3.3006 | |
QNAP QuTS hero | <5.2.3.3006 |
We have already fixed the vulnerability in the following versions: QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.2.3.3006 build 20250108 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53698 has been classified as a high severity vulnerability due to its potential for exploitation by remote attackers with administrator access.
To fix CVE-2024-53698, upgrade your QNAP QTS or QuTS hero software to version 5.2.3.3007 or later.
CVE-2024-53698 affects QNAP QTS and QuTS hero versions up to and including 5.2.3.3006.
CVE-2024-53698 can potentially enable remote attackers to modify memory through a double free vulnerability.
There is currently no public exploit disclosed for CVE-2024-53698, but its high severity suggests it may be actively targeted.