CVE-2023-23368
high-risk
Published 2023-11-03
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2376 build 20230421 and later QTS 4.5.4.2374 build 20230416 and later QuTS hero h5.0.1.2376 build 20230421 and later QuTS hero h4.5.4.2374 build 20230417 and later QuTScloud c5.0.1.2374 and later
Do I need to act?
~
3.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (2)
Vendor Advisory
https://www.qnap.com/en/security-advisory/qsa-23-31
Vendor Advisory
https://www.qnap.com/en/security-advisory/qsa-23-31
64
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
7/34 · Low
Exposure
25/34 · High