CVE-2024-32763
high-risk
Published 2024-09-06
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.8.2823 build 20240712 and later QuTS hero h5.1.8.2823 build 20240712 and later
Do I need to act?
-
0.90% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (1)
Vendor Advisory
https://www.qnap.com/en/security-advisory/qsa-24-33
55
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
3/34 · Minimal
Exposure
22/34 · High