QNAP OS Format String Vulnerability in QTS and QuTS hero
CVE-2024-50402 Published on December 6, 2024
QTS, QuTS hero
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
Weakness Type
Use of Externally-Controlled Format String
The software uses a function that accepts a format string as an argument, but the format string originates from an external source.
Products Associated with CVE-2024-50402
Want to know whenever a new CVE is published for QNAP Qts? stack.watch will email you.
Affected Versions
QNAP Systems Inc. QTS:- Version 5.1.x and below 5.1.9.2954 build 20241120 is affected.
- Version 5.2.x and below 5.2.2.2950 build 20241114 is affected.
- Version h5.1.x and below h5.1.9.2954 build 20241120 is affected.
- Version h5.2.x and below h5.2.2.2952 build 20241116 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.