CVE-2023-45025

An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.4.2596 build 20231128 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:qnap:qts:4.5.4.1715:build_20210630:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1723:build_20210708:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1741:build_20210726:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1787:build_20210910:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1800:build_20210923:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1892:build_20211223:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1931:build_20220128:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.2012:build_20220419:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.2117:build_20220802:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.2280:build_20230112:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.2374:build_20230416:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.2627:-:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.2.2533:build_20230926:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.3.2578:build_20231110:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.4.2596:-:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1771:build_20210825:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1800:build_20210923:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1813:build_20211006:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1848:build_20211109:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1892:build_20211223:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1951:build_20220218:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1971:build_20220310:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1991:build_20220330:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2052:build_20220530:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2138:build_20220824:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2217:build_20221111:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2272:build_20230105:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2374:build_20230417:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2476:build_20230728:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2626:-:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:build_20230927:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.3.2578:build_20231110:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.4.2596:-:*:*:*:*:*:*
cpe:2.3:o:qnap:qutscloud:c5.1.0.2498:build_20230822:*:*:*:*:*:*

History

08 Feb 2024, 03:50

Type Values Removed Values Added
References () https://www.qnap.com/en/security-advisory/qsa-23-47 - () https://www.qnap.com/en/security-advisory/qsa-23-47 - Vendor Advisory
CVSS v2 : unknown
v3 : 9.0
v2 : unknown
v3 : 9.8
First Time Qnap
Qnap qts
Qnap quts Hero
Qnap qutscloud
CPE cpe:2.3:o:qnap:quts_hero:h4.5.4.2052:build_20220530:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1892:build_20211223:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.3.2578:build_20231110:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.4.2596:-:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2272:build_20230105:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2626:-:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1848:build_20211109:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1951:build_20220218:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.2.2533:build_20230926:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.2374:build_20230416:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1892:build_20211223:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1813:build_20211006:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1971:build_20220310:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.2117:build_20220802:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1771:build_20210825:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1723:build_20210708:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1800:build_20210923:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.2627:-:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2138:build_20220824:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1931:build_20220128:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2217:build_20221111:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.2280:build_20230112:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.3.2578:build_20231110:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1741:build_20210726:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1787:build_20210910:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2374:build_20230417:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1991:build_20220330:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.1715:build_20210630:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.2476:build_20230728:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.4.2596:-:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:build_20230927:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h4.5.4.1800:build_20210923:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*
cpe:2.3:o:qnap:qutscloud:c5.1.0.2498:build_20230822:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*
cpe:2.3:o:qnap:qts:4.5.4.2012:build_20220419:*:*:*:*:*:*
cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*

02 Feb 2024, 16:30

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-02 16:15

Updated : 2024-02-08 03:50


NVD link : CVE-2023-45025

Mitre link : CVE-2023-45025

CVE.ORG link : CVE-2023-45025


JSON object : View

Products Affected

qnap

  • quts_hero
  • qutscloud
  • qts
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')