Out-of-Bounds Write in QNAP QTS <5.2.3.3006 (remote admin)
CVE-2024-53697 Published on March 7, 2025

QTS, QuTS hero
An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory. We have already fixed the vulnerability in the following versions: QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.2.3.3006 build 20250108 and later

NVD

Weakness Type

What is a Memory Corruption Vulnerability?

The software writes data past the end, or before the beginning, of the intended buffer. Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.

CVE-2024-53697 has been classified to as a Memory Corruption vulnerability or weakness.


Products Associated with CVE-2024-53697

Want to know whenever a new CVE is published for QNAP Qts? stack.watch will email you.

 

Affected Versions

QNAP Systems Inc. QTS: QNAP Systems Inc. QuTS hero:

Exploit Probability

EPSS
0.15%
Percentile
35.55%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.