CVE-2018-19949
critical-risk
Published 2020-10-28
If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109.
Do I need to act?
!
44.2% chance of exploitation in next 30 days
EPSS score — higher than 56% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (3)
Vendor Advisory
https://www.qnap.com/zh-tw/security-advisory/qsa-20-01
Vendor Advisory
https://www.qnap.com/zh-tw/security-advisory/qsa-20-01
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-...
70
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
24/34 · High
Exposure
14/34 · Moderate