QNAP QTS/QuTS hero Auth Attempts Bypass (CVE202432771)
CVE-2024-32771 Published on September 6, 2024
QTS, QuTS hero
An improper restriction of excessive authentication attempts vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow local network authenticated administrators to perform an arbitrary number of authentication attempts via unspecified vectors.
QuTScloud is not affected.
We have already fixed the vulnerability in the following versions:
QTS 5.2.0.2782 build 20240601 and later
QuTS hero h5.2.0.2782 build 20240601 and later
Vulnerability Analysis
Weakness Type
Improper Restriction of Excessive Authentication Attempts
The software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.
Products Associated with CVE-2024-32771
stack.watch emails you whenever new vulnerabilities are published in QNAP Qts or QNAP Quts Hero. Just hit a watch button to start following.
Affected Versions
QNAP Systems Inc. QTS:- Version 5.1.x and below 5.2.0.2782 build 20240601 is affected.
- Version 5.0.x is unaffected.
- Version 4.5.x is unaffected.
- Version h5.1.x and below h5.2.0.2782 build 20240601 is affected.
- Version h5.0.x is unaffected.
- Version h4.5.x is unaffected.
- Version c5.0.x is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.