An incorrect authorization vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to bypass intended access restrictions via a network. QTS 5.x, QuTS hero are not affected.
We have already fixed the vulnerability in the following versions: QuTScloud c5.1.5.2651 and later QTS 4.5.4.2627 build 20231225 and later
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Qts | Qnap | 4.5.4.1715-build_20210630 (including) | 4.5.4.1715-build_20210630 (including) |
Qts | Qnap | 4.5.4.1723-build_20210708 (including) | 4.5.4.1723-build_20210708 (including) |
Qts | Qnap | 4.5.4.1741-build_20210726 (including) | 4.5.4.1741-build_20210726 (including) |
Qts | Qnap | 4.5.4.1787-build_20210910 (including) | 4.5.4.1787-build_20210910 (including) |
Qts | Qnap | 4.5.4.1800-build_20210923 (including) | 4.5.4.1800-build_20210923 (including) |
Qts | Qnap | 4.5.4.1892-build_20211223 (including) | 4.5.4.1892-build_20211223 (including) |
Qts | Qnap | 4.5.4.1931-build_20220128 (including) | 4.5.4.1931-build_20220128 (including) |
Qts | Qnap | 4.5.4.2012-build_20220419 (including) | 4.5.4.2012-build_20220419 (including) |
Qts | Qnap | 4.5.4.2117-build_20220802 (including) | 4.5.4.2117-build_20220802 (including) |
Qts | Qnap | 4.5.4.2280-build_20230112 (including) | 4.5.4.2280-build_20230112 (including) |
Qts | Qnap | 4.5.4.2374-build_20230416 (including) | 4.5.4.2374-build_20230416 (including) |
Qts | Qnap | 4.5.4.2627 (including) | 4.5.4.2627 (including) |
Qutscloud | Qnap | c5.1.0.2498-build_20230822 (including) | c5.1.0.2498-build_20230822 (including) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.