CVE-2023-50358
moderate-risk
Published 2024-02-13
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QTS 4.5.4.2627 build 20231225 and later QTS 4.3.6.2665 build 20240131 and later QTS 4.3.4.2675 build 20240131 and later QTS 4.3.3.2644 build 20240131 and later QTS 4.2.6 build 20240131 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later
Do I need to act?
~
1.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.8/10
Medium
ADJACENT_NETWORK
/ HIGH complexity
Affected Products (20)
Affected Vendors
References (6)
Third Party Advisory
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941...
Vendor Advisory
https://www.qnap.com/en/security-advisory/qsa-23-57
Third Party Advisory
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941...
Vendor Advisory
https://www.qnap.com/en/security-advisory/qsa-23-57
41
/ 100
moderate-risk
Severity
15/34 · Moderate
Exploitability
5/34 · Minimal
Exposure
21/34 · High