All the vulnerabilites related to QNAP Systems Inc. - QUSBCam2
cve-2021-34344
Vulnerability from cvelistv5
Published
2021-09-10 04:00
Modified
2024-09-17 02:17
Severity ?
EPSS score ?
Summary
A stack buffer overflow vulnerability has been reported to affect QNAP device running QUSBCam2. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QUSBCam2: QTS 4.5.4: QUSBCam2 1.1.4 ( 2021/07/30 ) and later QTS 5.0: QUSBCam2 2.0.1 ( 2021/08/03 ) and later QTS 4.3.6: QUSBCam2 1.1.4 ( 2021/07/30 ) and later QTS 4.3.3: QUSBCam2 1.1.4 ( 2021/08/06 ) and later QuTS hero 4.5.3: QUSBCam2 1.1.4 ( 2021/07/30 ) and later
References
▼ | URL | Tags |
---|---|---|
https://www.qnap.com/en/security-advisory/qsa-21-34 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | QNAP Systems Inc. | QUSBCam2 |
Version: unspecified < 1.1.4 ( 2021/07/30 ) |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:05:52.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.qnap.com/en/security-advisory/qsa-21-34" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "QTS 4.5.4" ], "product": "QUSBCam2", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "1.1.4 ( 2021/07/30 )", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "QTS 5.0" ], "product": "QUSBCam2", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "2.0.1 ( 2021/08/03 )", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "QTS 4.3.6" ], "product": "QUSBCam2", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "1.1.4 ( 2021/07/30 )", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "QTS 4.3.3" ], "product": "QUSBCam2", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "1.1.4 ( 2021/08/06 )", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "QuTS hero 4.5.3" ], "product": "QUSBCam2", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "1.1.4 ( 2021/07/30 )", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "crixer" } ], "datePublic": "2021-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A stack buffer overflow vulnerability has been reported to affect QNAP device running QUSBCam2. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QUSBCam2: QTS 4.5.4: QUSBCam2 1.1.4 ( 2021/07/30 ) and later QTS 5.0: QUSBCam2 2.0.1 ( 2021/08/03 ) and later QTS 4.3.6: QUSBCam2 1.1.4 ( 2021/07/30 ) and later QTS 4.3.3: QUSBCam2 1.1.4 ( 2021/08/06 ) and later QuTS hero 4.5.3: QUSBCam2 1.1.4 ( 2021/07/30 ) and later" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-10T04:00:24", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.qnap.com/en/security-advisory/qsa-21-34" } ], "solutions": [ { "lang": "en", "value": "We have already fixed this vulnerability in the following versions of QUSBCam2:\nQTS 4.5.4: QUSBCam2 1.1.4 ( 2021/07/30 ) and later\nQTS 5.0: QUSBCam2 2.0.1 ( 2021/08/03 ) and later\nQTS 4.3.6: QUSBCam2 1.1.4 ( 2021/07/30 ) and later\nQTS 4.3.3: QUSBCam2 1.1.4 ( 2021/08/06 ) and later\nQuTS hero 4.5.3: QUSBCam2 1.1.4 ( 2021/07/30 ) and later" } ], "source": { "advisory": "QSA-21-34", "discovery": "EXTERNAL" }, "title": "Stack Buffer Overflow Vulnerability in QUSBCam2", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2021-09-10T09:37:00.000Z", "ID": "CVE-2021-34344", "STATE": "PUBLIC", "TITLE": "Stack Buffer Overflow Vulnerability in QUSBCam2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QUSBCam2", "version": { "version_data": [ { "platform": "QTS 4.5.4", "version_affected": "\u003c", "version_value": "1.1.4 ( 2021/07/30 )" }, { "platform": "QTS 5.0", "version_affected": "\u003c", "version_value": "2.0.1 ( 2021/08/03 )" }, { "platform": "QTS 4.3.6", "version_affected": "\u003c", "version_value": "1.1.4 ( 2021/07/30 )" }, { "platform": "QTS 4.3.3", "version_affected": "\u003c", "version_value": "1.1.4 ( 2021/08/06 )" }, { "platform": "QuTS hero 4.5.3", "version_affected": "\u003c", "version_value": "1.1.4 ( 2021/07/30 )" } ] } } ] }, "vendor_name": "QNAP Systems Inc." } ] } }, "credit": [ { "lang": "eng", "value": "crixer" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stack buffer overflow vulnerability has been reported to affect QNAP device running QUSBCam2. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QUSBCam2: QTS 4.5.4: QUSBCam2 1.1.4 ( 2021/07/30 ) and later QTS 5.0: QUSBCam2 2.0.1 ( 2021/08/03 ) and later QTS 4.3.6: QUSBCam2 1.1.4 ( 2021/07/30 ) and later QTS 4.3.3: QUSBCam2 1.1.4 ( 2021/08/06 ) and later QuTS hero 4.5.3: QUSBCam2 1.1.4 ( 2021/07/30 ) and later" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787 Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qnap.com/en/security-advisory/qsa-21-34", "refsource": "MISC", "url": "https://www.qnap.com/en/security-advisory/qsa-21-34" } ] }, "solution": [ { "lang": "en", "value": "We have already fixed this vulnerability in the following versions of QUSBCam2:\nQTS 4.5.4: QUSBCam2 1.1.4 ( 2021/07/30 ) and later\nQTS 5.0: QUSBCam2 2.0.1 ( 2021/08/03 ) and later\nQTS 4.3.6: QUSBCam2 1.1.4 ( 2021/07/30 ) and later\nQTS 4.3.3: QUSBCam2 1.1.4 ( 2021/08/06 ) and later\nQuTS hero 4.5.3: QUSBCam2 1.1.4 ( 2021/07/30 ) and later" } ], "source": { "advisory": "QSA-21-34", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2021-34344", "datePublished": "2021-09-10T04:00:24.634958Z", "dateReserved": "2021-06-08T00:00:00", "dateUpdated": "2024-09-17T02:17:07.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23373
Vulnerability from cvelistv5
Published
2023-10-20 16:14
Modified
2024-09-16 15:48
Severity ?
EPSS score ?
Summary
An OS command injection vulnerability has been reported to affect QUSBCam2. If exploited, the vulnerability could allow users to execute commands via a network.
We have already fixed the vulnerability in the following version:
QUSBCam2 2.0.3 ( 2023/06/15 ) and later
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | QNAP Systems Inc. | QUSBCam2 |
Version: 2.0.x < 2.0.3 ( 2023/06/15 ) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:28:40.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.qnap.com/en/security-advisory/qsa-23-43" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:qnap:qusbcam2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "qusbcam2", "vendor": "qnap", "versions": [ { "lessThan": "2.0.3", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-23373", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T15:48:05.680279Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T15:48:42.557Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "QUSBCam2", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "2.0.3 ( 2023/06/15 )", "status": "affected", "version": "2.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "a crixer" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An OS command injection vulnerability has been reported to affect QUSBCam2. If exploited, the vulnerability could allow users to execute commands via a network.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQUSBCam2 2.0.3 ( 2023/06/15 ) and later\u003cbr\u003e" } ], "value": "An OS command injection vulnerability has been reported to affect QUSBCam2. If exploited, the vulnerability could allow users to execute commands via a network.\n\nWe have already fixed the vulnerability in the following version:\nQUSBCam2 2.0.3 ( 2023/06/15 ) and later\n" } ], "impacts": [ { "capecId": "CAPEC-15", "descriptions": [ { "lang": "en", "value": "CAPEC-15" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T16:14:18.593Z", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-23-43" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQUSBCam2 2.0.3 ( 2023/06/15 ) and later\u003cbr\u003e" } ], "value": "We have already fixed the vulnerability in the following version:\nQUSBCam2 2.0.3 ( 2023/06/15 ) and later\n" } ], "source": { "advisory": "QSA-23-43", "discovery": "EXTERNAL" }, "title": "QUSBCam2", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2023-23373", "datePublished": "2023-10-20T16:14:18.593Z", "dateReserved": "2023-01-11T20:15:53.087Z", "dateUpdated": "2024-09-16T15:48:42.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }