QNAP OS Format String Vulnerability in QTS and QuTS hero
CVE-2024-50402 Published on December 6, 2024

QTS, QuTS hero
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QTS 5.2.2.2950 build 20241114 and later QuTS hero h5.1.9.2954 build 20241120 and later QuTS hero h5.2.2.2952 build 20241116 and later

NVD

Weakness Type

Use of Externally-Controlled Format String

The software uses a function that accepts a format string as an argument, but the format string originates from an external source.


Products Associated with CVE-2024-50402

Want to know whenever a new CVE is published for QNAP Qts? stack.watch will email you.

 

Affected Versions

QNAP Systems Inc. QTS: QNAP Systems Inc. QuTS hero:

Exploit Probability

EPSS
0.75%
Percentile
72.77%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.