An incorrect authorization vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to bypass intended access restrictions via a network.
We have already fixed the vulnerability in the following versions: QTS 5.1.6.2722 build 20240402 and later QuTS hero h5.1.6.2734 build 20240414 and later
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Qts | Qnap | 5.1.0.2348-build_20230325 (including) | 5.1.0.2348-build_20230325 (including) |
Qts | Qnap | 5.1.0.2399-build_20230515 (including) | 5.1.0.2399-build_20230515 (including) |
Qts | Qnap | 5.1.0.2418-build_20230603 (including) | 5.1.0.2418-build_20230603 (including) |
Qts | Qnap | 5.1.0.2444-build_20230629 (including) | 5.1.0.2444-build_20230629 (including) |
Qts | Qnap | 5.1.0.2466-build_20230721 (including) | 5.1.0.2466-build_20230721 (including) |
Qts | Qnap | 5.1.1.2491-build_20230815 (including) | 5.1.1.2491-build_20230815 (including) |
Qts | Qnap | 5.1.2.2533-build_20230926 (including) | 5.1.2.2533-build_20230926 (including) |
Qts | Qnap | 5.1.3.2578-build_20231110 (including) | 5.1.3.2578-build_20231110 (including) |
Qts | Qnap | 5.1.4.2596-build_20231128 (including) | 5.1.4.2596-build_20231128 (including) |
Qts | Qnap | 5.1.5.2645-build_20240116 (including) | 5.1.5.2645-build_20240116 (including) |
Qts | Qnap | 5.1.5.2679-build_20240219 (including) | 5.1.5.2679-build_20240219 (including) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.