QNAP OS Improper Certificate Validation Vulnerability
CVE-2024-48865 Published on December 6, 2024
QTS, QuTS hero
An improper certificate validation vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow attackers with local network access to compromise the security of the system.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
Weakness Type
Improper Certificate Validation
The software does not validate, or incorrectly validates, a certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
Products Associated with CVE-2024-48865
Want to know whenever a new CVE is published for QNAP Qts? stack.watch will email you.
Affected Versions
QNAP Systems Inc. QTS:- Version 5.1.x and below 5.1.9.2954 build 20241120 is affected.
- Version 5.2.x and below 5.2.2.2950 build 20241114 is affected.
- Version h5.1.x and below h5.1.9.2954 build 20241120 is affected.
- Version h5.2.x and below h5.2.2.2952 build 20241116 is affected.
- Version 5.1.x and below 5.1.9.2954 build 20241120 is affected.
- Version 5.2.x and below 5.2.2.2950 build 20241114 is affected.
- Version h5.1.x and below h5.1.9.2954 build 20241120 is affected.
- Version h5.2.x and below h5.2.2.2952 build 20241116 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.