A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later.
The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Qes | Qnap | * | 2.1.1 (excluding) |
Qes | Qnap | 2.1.1 (including) | 2.1.1 (including) |
Qes | Qnap | 2.1.1-build_20200211 (including) | 2.1.1-build_20200211 (including) |
Qes | Qnap | 2.1.1-build_20200303 (including) | 2.1.1-build_20200303 (including) |
Qes | Qnap | 2.1.1-build_20200319 (including) | 2.1.1-build_20200319 (including) |
Qes | Qnap | 2.1.1-build_20200424 (including) | 2.1.1-build_20200424 (including) |
There are two main variations of a hard-coded password: