QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack.
Published 2017-09-14 15:29:00
Updated 2019-10-03 00:03:26
View at NVD,   CVE.org
Vulnerability category: Execute code

Products affected by CVE-2017-13067

  • Qnap » QTS
    Versions from including (>=) 4.3.0 and up to, including, (<=) 4.3.3.0299
    cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*
  • Qnap » QTS
    Versions from including (>=) 4.2.0 and up to, including, (<=) 4.2.6
    cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*

Exploit prediction scoring system (EPSS) score for CVE-2017-13067

51.07%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2017-13067

  • QNAP Transcode Server Command Execution
    Disclosure Date: 2017-08-06
    First seen: 2020-04-26
    exploit/linux/misc/qnap_transcode_server
    This module exploits an unauthenticated remote command injection vulnerability in QNAP NAS devices. The transcoding server listens on port 9251 by default and is vulnerable to command injection using the 'rmfile' command. This module was tested successfully

CVSS scores for CVE-2017-13067

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.5
HIGH AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
NIST
9.8
CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST

References for CVE-2017-13067

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!