Vulnerability Details : CVE-2023-34979
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.
We have already fixed the vulnerability in the following versions:
QTS 4.5.4.2790 build 20240605 and later
QuTS hero h4.5.4.2790 build 20240606 and later
Products affected by CVE-2023-34979
- cpe:2.3:o:qnap:qts:4.5.4.1715:build_20210630:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.1723:build_20210708:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.1741:build_20210726:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.1787:build_20210910:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.1800:build_20210923:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.1892:build_20211223:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.1931:build_20220128:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.2012:build_20220419:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.2117:build_20220802:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.2280:build_20230112:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.2374:build_20230416:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.2467:build_20230718:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:4.5.4.2627:build_20231225:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.1771:build_20210825:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.1800:build_20210923:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.1813:build_20211006:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.1848:build_20211109:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.1892:build_20211223:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.1951:build_20220218:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.1971:build_20220310:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.1991:build_20220330:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.2052:build_20220530:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.2138:build_20220824:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.2217:build_20221111:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.2272:build_20230105:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.2374:build_20230417:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.2476:build_20230728:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:h4.5.4.2626:build_20231225:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-34979
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 43 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-34979
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.6
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L |
N/A
|
N/A
|
QNAP Systems, Inc. | 2024-09-06 |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST | 2024-09-17 |
6.6
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L |
2.3
|
3.7
|
QNAP Systems, Inc. | 2024-09-06 |
CWE ids for CVE-2023-34979
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by:
- 2fd009eb-170a-4625-932b-17a53af1051f (Primary)
- security@qnapsecurity.com.tw (Primary)
References for CVE-2023-34979
-
https://www.qnap.com/en/security-advisory/qsa-24-32
Multiple Vulnerabilities in QTS and QuTS hero - Security Advisory | QNAPVendor Advisory
Jump to