Vulnerability Details : CVE-2023-32974
A path traversal vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to read the contents of unexpected files and expose sensitive data via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.0.2444 build 20230629 and later
QuTS hero h5.1.0.2424 build 20230609 and later
QuTScloud c5.1.0.2498 and later
Vulnerability category: Directory traversal
Products affected by CVE-2023-32974
- cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*
- cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-32974
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-32974
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
QNAP Systems, Inc. |
CWE ids for CVE-2023-32974
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by:
- nvd@nist.gov (Primary)
- security@qnapsecurity.com.tw (Secondary)
References for CVE-2023-32974
-
https://www.qnap.com/en/security-advisory/qsa-23-42
Vulnerability in QTS, QuTS hero, and QuTScloud - Security Advisory | QNAPVendor Advisory
Jump to