
Cloud Vulnerability DB
A community-led vulnerabilities database
An OS command injection vulnerability (CVE-2023-23367) has been identified affecting multiple QNAP operating system versions. The vulnerability was disclosed on November 10, 2023, and impacts QTS, QuTS hero, and QuTScloud systems. When exploited, this vulnerability enables authenticated administrators to execute commands through network access (Vendor Advisory).
The vulnerability is classified as an OS Command Injection (CWE-78), specifically involving improper neutralization of special elements used in OS commands. The CVSS v3.1 base scores vary between sources, with NVD assigning a HIGH severity score of 7.2 (Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), while QNAP assessed it as MEDIUM severity with a score of 4.7 (Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L) (NVD).
If successfully exploited, this vulnerability allows authenticated administrators to execute arbitrary system commands via network access, potentially leading to system compromise with high impacts on confidentiality, integrity, and availability of the affected systems (Vendor Advisory).
QNAP has released patches to address this vulnerability in the following versions: QTS 5.0.1.2376 build 20230421 and later, QuTS hero h5.0.1.2376 build 20230421 and later, and QuTScloud c5.1.0.2498 and later. Users are advised to upgrade to these patched versions to mitigate the vulnerability (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."