A missing authorization vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow local authenticated users to access data or perform actions that they should not be allowed to perform via unspecified vectors. QuTScloud, is not affected.
We have already fixed the vulnerability in the following versions: QTS 5.2.0.2737 build 20240417 and later QuTS hero h5.2.0.2782 build 20240601 and later
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Qts | Qnap | 5.1.0.2348-build_20230325 (including) | 5.1.0.2348-build_20230325 (including) |
Qts | Qnap | 5.1.0.2399-build_20230515 (including) | 5.1.0.2399-build_20230515 (including) |
Qts | Qnap | 5.1.0.2418-build_20230603 (including) | 5.1.0.2418-build_20230603 (including) |
Qts | Qnap | 5.1.0.2444-build_20230629 (including) | 5.1.0.2444-build_20230629 (including) |
Qts | Qnap | 5.1.0.2466-build_20230721 (including) | 5.1.0.2466-build_20230721 (including) |
Qts | Qnap | 5.1.1.2491-build_20230815 (including) | 5.1.1.2491-build_20230815 (including) |
Qts | Qnap | 5.1.2.2533-build_20230926 (including) | 5.1.2.2533-build_20230926 (including) |
Qts | Qnap | 5.1.3.2578-build_20231110 (including) | 5.1.3.2578-build_20231110 (including) |
Qts | Qnap | 5.1.4.2596-build_20231128 (including) | 5.1.4.2596-build_20231128 (including) |
Qts | Qnap | 5.1.5.2645-build_20240116 (including) | 5.1.5.2645-build_20240116 (including) |
Qts | Qnap | 5.1.5.2679-build_20240219 (including) | 5.1.5.2679-build_20240219 (including) |
Qts | Qnap | 5.1.6.2722-build_20240402 (including) | 5.1.6.2722-build_20240402 (including) |
Qts | Qnap | 5.1.7.2770-build_20240520 (including) | 5.1.7.2770-build_20240520 (including) |
Qts | Qnap | 5.1.8.2823-build_20240712 (including) | 5.1.8.2823-build_20240712 (including) |
Qts | Qnap | 5.2.0.2737-build_20240417 (including) | 5.2.0.2737-build_20240417 (including) |
Qts | Qnap | 5.2.0.2744-build_20240424 (including) | 5.2.0.2744-build_20240424 (including) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied, users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.