CVE-2019-7193
critical-risk
Published 2019-12-05
This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions.
Do I need to act?
!
25.8% chance of exploitation in next 30 days
EPSS score — higher than 74% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (5)
Vendor Advisory
https://www.qnap.com/zh-tw/security-advisory/nas-201911-25
Vendor Advisory
https://www.qnap.com/zh-tw/security-advisory/nas-201911-25
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-...
72
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
22/34 · High
Exposure
18/34 · Moderate