Search criteria
6 vulnerabilities found for qss by qnap
FKIE_CVE-2021-28805
Vulnerability from fkie_nvd - Published: 2021-06-11 07:15 - Updated: 2024-11-21 06:00
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| qnap | qss | * | |
| qnap | qsw-m2108-2c | - | |
| qnap | qsw-m2108-2s | - | |
| qnap | qsw-m2108r-2c | - | |
| qnap | qss | * | |
| qnap | qsw-m408 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qnap:qss:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74B6E008-6B5D-48EB-99B4-DB9BC1120F8E",
"versionEndExcluding": "1.0.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qnap:qsw-m2108-2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A690794E-3F9B-47DA-A365-E8F100C730E2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:qnap:qsw-m2108-2s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21692724-A864-4CEB-898C-4E6691C403C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:qnap:qsw-m2108r-2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37F5E9FC-2CE2-473F-81C1-676BCCFFBD3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qnap:qss:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D07C936-1C05-4269-8DC9-9AF534B5177B",
"versionEndExcluding": "1.0.12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qnap:qsw-m408:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D7605B1-0C50-4CF5-81A8-61FE897DA748",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408."
},
{
"lang": "es",
"value": "Se ha reportado la inclusi\u00f3n de informaci\u00f3n confidencial en el c\u00f3digo fuente que afecta a determinados switches de QNAP que ejecutan QSS. Si es explotada, esta vulnerabilidad permite a atacantes leer datos de la aplicaci\u00f3n. Este problema afecta: QNAP Systems Inc. QSS versiones anteriores a 1.0.3 build 20210505 en QSW-M2108-2C; versiones anteriores a 1.0.3 build 20210505 en QSW-M2108-2S; versiones anteriores a 1.0.3 build 20210505 en QSW-M2108R-2C; versiones anteriores a 1.0.12 build 20210506 en QSW-M408"
}
],
"id": "CVE-2021-28805",
"lastModified": "2024-11-21T06:00:14.223",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security@qnapsecurity.com.tw",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-11T07:15:06.593",
"references": [
{
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24"
}
],
"sourceIdentifier": "security@qnapsecurity.com.tw",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-540"
}
],
"source": "security@qnapsecurity.com.tw",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-28801
Vulnerability from fkie_nvd - Published: 2021-06-11 07:15 - Updated: 2024-11-21 06:00
Severity ?
3.1 (Low) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
An out-of-bounds read vulnerability has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read sensitive information on the system. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.2 build 20210122 on QSW-M2108-2C; versions prior to 1.0.2 build 20210122 on QSW-M2108-2S; versions prior to 1.0.2 build 20210122 on QSW-M2108R-2C.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| qnap | qss | * | |
| qnap | qsw-m2108-2c | - | |
| qnap | qsw-m2108-2s | - | |
| qnap | qsw-m2108r-2c | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qnap:qss:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF245FB-7B7B-4050-8261-3EFB2E3D8F15",
"versionEndExcluding": "1.0.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qnap:qsw-m2108-2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A690794E-3F9B-47DA-A365-E8F100C730E2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:qnap:qsw-m2108-2s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21692724-A864-4CEB-898C-4E6691C403C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:qnap:qsw-m2108r-2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37F5E9FC-2CE2-473F-81C1-676BCCFFBD3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read vulnerability has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read sensitive information on the system. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.2 build 20210122 on QSW-M2108-2C; versions prior to 1.0.2 build 20210122 on QSW-M2108-2S; versions prior to 1.0.2 build 20210122 on QSW-M2108R-2C."
},
{
"lang": "es",
"value": "Se ha reportado una vulnerabilidad de lectura fuera de l\u00edmites que afecta a determinados switches de QNAP que ejecutan QSS. Si es explotada, esta vulnerabilidad permite a atacantes leer informaci\u00f3n confidencial en el sistema. Este problema afecta: QNAP Systems Inc. versiones de QSS versiones anteriores a 1.0.2 build 20210122 en QSW-M2108-2C; versiones anteriores a 1.0.2 build 20210122 en QSW-M2108-2S; versiones anteriores a 1.0.2 build 20210122 en QSW-M2108R-2C"
}
],
"id": "CVE-2021-28801",
"lastModified": "2024-11-21T06:00:13.787",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4,
"source": "security@qnapsecurity.com.tw",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-11T07:15:06.490",
"references": [
{
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23"
}
],
"sourceIdentifier": "security@qnapsecurity.com.tw",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "security@qnapsecurity.com.tw",
"type": "Secondary"
}
]
}
CVE-2021-28805 (GCVE-0-2021-28805)
Vulnerability from cvelistv5 – Published: 2021-06-11 06:35 – Updated: 2024-09-17 04:19
VLAI?
Title
Inclusion of Sensitive Information in QSS
Summary
Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408.
Severity ?
7.8 (High)
CWE
- CWE-540 - Information Exposure Through Source Code
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| QNAP Systems Inc. | QSS |
Affected:
unspecified , < 1.0.3 build 20210505
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Jan Hoff
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T21:55:11.643Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"QSW-M2108-2C"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.3 build 20210505",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"QSW-M2108-2S"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.3 build 20210505",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"QSW-M2108R-2C"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.3 build 20210505",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"QSW-M408"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.12 build 20210506",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Jan Hoff"
}
],
"datePublic": "2021-06-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-540",
"description": "CWE-540 Information Exposure Through Source Code",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-11T06:35:14",
"orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
"shortName": "qnap"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24"
}
],
"solutions": [
{
"lang": "en",
"value": "QNAP have already fixed this vulnerability in the following versions:\n\nQSW-M2108-2C: QSS 1.0.3 build 20210505 and later\nQSW-M2108-2S: QSS 1.0.3 build 20210505 and later\nQSW-M2108R-2C: QSS 1.0.3 build 20210505 and later\nQSW-M408: QSS 1.0.12 build 20210506 and later"
}
],
"source": {
"advisory": "QSA-21-24",
"discovery": "EXTERNAL"
},
"title": "Inclusion of Sensitive Information in QSS",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@qnap.com",
"DATE_PUBLIC": "2021-06-11T06:01:00.000Z",
"ID": "CVE-2021-28805",
"STATE": "PUBLIC",
"TITLE": "Inclusion of Sensitive Information in QSS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "QSS",
"version": {
"version_data": [
{
"platform": "QSW-M2108-2C",
"version_affected": "\u003c",
"version_value": "1.0.3 build 20210505"
},
{
"platform": "QSW-M2108-2S",
"version_affected": "\u003c",
"version_value": "1.0.3 build 20210505"
},
{
"platform": "QSW-M2108R-2C",
"version_affected": "\u003c",
"version_value": "1.0.3 build 20210505"
},
{
"platform": "QSW-M408",
"version_affected": "\u003c",
"version_value": "1.0.12 build 20210506"
}
]
}
}
]
},
"vendor_name": "QNAP Systems Inc."
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Jan Hoff"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-540 Information Exposure Through Source Code"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24",
"refsource": "MISC",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24"
}
]
},
"solution": [
{
"lang": "en",
"value": "QNAP have already fixed this vulnerability in the following versions:\n\nQSW-M2108-2C: QSS 1.0.3 build 20210505 and later\nQSW-M2108-2S: QSS 1.0.3 build 20210505 and later\nQSW-M2108R-2C: QSS 1.0.3 build 20210505 and later\nQSW-M408: QSS 1.0.12 build 20210506 and later"
}
],
"source": {
"advisory": "QSA-21-24",
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
"assignerShortName": "qnap",
"cveId": "CVE-2021-28805",
"datePublished": "2021-06-11T06:35:15.074830Z",
"dateReserved": "2021-03-18T00:00:00",
"dateUpdated": "2024-09-17T04:19:06.268Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-28801 (GCVE-0-2021-28801)
Vulnerability from cvelistv5 – Published: 2021-06-11 06:35 – Updated: 2024-09-17 00:06
VLAI?
Title
Out-of-Bounds Read Vulnerability in QSS
Summary
An out-of-bounds read vulnerability has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read sensitive information on the system. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.2 build 20210122 on QSW-M2108-2C; versions prior to 1.0.2 build 20210122 on QSW-M2108-2S; versions prior to 1.0.2 build 20210122 on QSW-M2108R-2C.
Severity ?
CWE
- CWE-125 - Out-of-bounds Read
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| QNAP Systems Inc. | QSS |
Affected:
unspecified , < 1.0.2 build 20210122
(custom)
|
||||||||||||
|
||||||||||||||
Credits
Qian Chen from Codesafe Team of Legendsec at Qi'anxin Group
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T21:55:11.777Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"QSW-M2108-2C"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.2 build 20210122",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"QSW-M2108-2S"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.2 build 20210122",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"QSW-M2108R-2C"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.2 build 20210122",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Qian Chen from Codesafe Team of Legendsec at Qi\u0027anxin Group"
}
],
"datePublic": "2021-06-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read vulnerability has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read sensitive information on the system. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.2 build 20210122 on QSW-M2108-2C; versions prior to 1.0.2 build 20210122 on QSW-M2108-2S; versions prior to 1.0.2 build 20210122 on QSW-M2108R-2C."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-11T06:35:14",
"orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
"shortName": "qnap"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23"
}
],
"solutions": [
{
"lang": "en",
"value": "QNAP have already fixed this vulnerability in the following versions:\n\nQSW-M2108-2C: QSS 1.0.2 build 20210122 and later\nQSW-M2108-2S: QSS 1.0.2 build 20210122 and later\nQSW-M2108R-2C: QSS 1.0.2 build 20210122 and later"
}
],
"source": {
"advisory": "QSA-21-23",
"discovery": "EXTERNAL"
},
"title": "Out-of-Bounds Read Vulnerability in QSS",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@qnap.com",
"DATE_PUBLIC": "2021-06-11T06:01:00.000Z",
"ID": "CVE-2021-28801",
"STATE": "PUBLIC",
"TITLE": "Out-of-Bounds Read Vulnerability in QSS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "QSS",
"version": {
"version_data": [
{
"platform": "QSW-M2108-2C",
"version_affected": "\u003c",
"version_value": "1.0.2 build 20210122"
},
{
"platform": "QSW-M2108-2S",
"version_affected": "\u003c",
"version_value": "1.0.2 build 20210122"
},
{
"platform": "QSW-M2108R-2C",
"version_affected": "\u003c",
"version_value": "1.0.2 build 20210122"
}
]
}
}
]
},
"vendor_name": "QNAP Systems Inc."
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Qian Chen from Codesafe Team of Legendsec at Qi\u0027anxin Group"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An out-of-bounds read vulnerability has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read sensitive information on the system. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.2 build 20210122 on QSW-M2108-2C; versions prior to 1.0.2 build 20210122 on QSW-M2108-2S; versions prior to 1.0.2 build 20210122 on QSW-M2108R-2C."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-125 Out-of-bounds Read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23",
"refsource": "MISC",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23"
}
]
},
"solution": [
{
"lang": "en",
"value": "QNAP have already fixed this vulnerability in the following versions:\n\nQSW-M2108-2C: QSS 1.0.2 build 20210122 and later\nQSW-M2108-2S: QSS 1.0.2 build 20210122 and later\nQSW-M2108R-2C: QSS 1.0.2 build 20210122 and later"
}
],
"source": {
"advisory": "QSA-21-23",
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
"assignerShortName": "qnap",
"cveId": "CVE-2021-28801",
"datePublished": "2021-06-11T06:35:14.369676Z",
"dateReserved": "2021-03-18T00:00:00",
"dateUpdated": "2024-09-17T00:06:25.170Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-28805 (GCVE-0-2021-28805)
Vulnerability from nvd – Published: 2021-06-11 06:35 – Updated: 2024-09-17 04:19
VLAI?
Title
Inclusion of Sensitive Information in QSS
Summary
Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408.
Severity ?
7.8 (High)
CWE
- CWE-540 - Information Exposure Through Source Code
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| QNAP Systems Inc. | QSS |
Affected:
unspecified , < 1.0.3 build 20210505
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Jan Hoff
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T21:55:11.643Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"QSW-M2108-2C"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.3 build 20210505",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"QSW-M2108-2S"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.3 build 20210505",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"QSW-M2108R-2C"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.3 build 20210505",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"QSW-M408"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.12 build 20210506",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Jan Hoff"
}
],
"datePublic": "2021-06-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-540",
"description": "CWE-540 Information Exposure Through Source Code",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-11T06:35:14",
"orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
"shortName": "qnap"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24"
}
],
"solutions": [
{
"lang": "en",
"value": "QNAP have already fixed this vulnerability in the following versions:\n\nQSW-M2108-2C: QSS 1.0.3 build 20210505 and later\nQSW-M2108-2S: QSS 1.0.3 build 20210505 and later\nQSW-M2108R-2C: QSS 1.0.3 build 20210505 and later\nQSW-M408: QSS 1.0.12 build 20210506 and later"
}
],
"source": {
"advisory": "QSA-21-24",
"discovery": "EXTERNAL"
},
"title": "Inclusion of Sensitive Information in QSS",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@qnap.com",
"DATE_PUBLIC": "2021-06-11T06:01:00.000Z",
"ID": "CVE-2021-28805",
"STATE": "PUBLIC",
"TITLE": "Inclusion of Sensitive Information in QSS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "QSS",
"version": {
"version_data": [
{
"platform": "QSW-M2108-2C",
"version_affected": "\u003c",
"version_value": "1.0.3 build 20210505"
},
{
"platform": "QSW-M2108-2S",
"version_affected": "\u003c",
"version_value": "1.0.3 build 20210505"
},
{
"platform": "QSW-M2108R-2C",
"version_affected": "\u003c",
"version_value": "1.0.3 build 20210505"
},
{
"platform": "QSW-M408",
"version_affected": "\u003c",
"version_value": "1.0.12 build 20210506"
}
]
}
}
]
},
"vendor_name": "QNAP Systems Inc."
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Jan Hoff"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-540 Information Exposure Through Source Code"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24",
"refsource": "MISC",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24"
}
]
},
"solution": [
{
"lang": "en",
"value": "QNAP have already fixed this vulnerability in the following versions:\n\nQSW-M2108-2C: QSS 1.0.3 build 20210505 and later\nQSW-M2108-2S: QSS 1.0.3 build 20210505 and later\nQSW-M2108R-2C: QSS 1.0.3 build 20210505 and later\nQSW-M408: QSS 1.0.12 build 20210506 and later"
}
],
"source": {
"advisory": "QSA-21-24",
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
"assignerShortName": "qnap",
"cveId": "CVE-2021-28805",
"datePublished": "2021-06-11T06:35:15.074830Z",
"dateReserved": "2021-03-18T00:00:00",
"dateUpdated": "2024-09-17T04:19:06.268Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-28801 (GCVE-0-2021-28801)
Vulnerability from nvd – Published: 2021-06-11 06:35 – Updated: 2024-09-17 00:06
VLAI?
Title
Out-of-Bounds Read Vulnerability in QSS
Summary
An out-of-bounds read vulnerability has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read sensitive information on the system. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.2 build 20210122 on QSW-M2108-2C; versions prior to 1.0.2 build 20210122 on QSW-M2108-2S; versions prior to 1.0.2 build 20210122 on QSW-M2108R-2C.
Severity ?
CWE
- CWE-125 - Out-of-bounds Read
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| QNAP Systems Inc. | QSS |
Affected:
unspecified , < 1.0.2 build 20210122
(custom)
|
||||||||||||
|
||||||||||||||
Credits
Qian Chen from Codesafe Team of Legendsec at Qi'anxin Group
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T21:55:11.777Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"QSW-M2108-2C"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.2 build 20210122",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"QSW-M2108-2S"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.2 build 20210122",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"QSW-M2108R-2C"
],
"product": "QSS",
"vendor": "QNAP Systems Inc.",
"versions": [
{
"lessThan": "1.0.2 build 20210122",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Qian Chen from Codesafe Team of Legendsec at Qi\u0027anxin Group"
}
],
"datePublic": "2021-06-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read vulnerability has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read sensitive information on the system. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.2 build 20210122 on QSW-M2108-2C; versions prior to 1.0.2 build 20210122 on QSW-M2108-2S; versions prior to 1.0.2 build 20210122 on QSW-M2108R-2C."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-11T06:35:14",
"orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
"shortName": "qnap"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23"
}
],
"solutions": [
{
"lang": "en",
"value": "QNAP have already fixed this vulnerability in the following versions:\n\nQSW-M2108-2C: QSS 1.0.2 build 20210122 and later\nQSW-M2108-2S: QSS 1.0.2 build 20210122 and later\nQSW-M2108R-2C: QSS 1.0.2 build 20210122 and later"
}
],
"source": {
"advisory": "QSA-21-23",
"discovery": "EXTERNAL"
},
"title": "Out-of-Bounds Read Vulnerability in QSS",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@qnap.com",
"DATE_PUBLIC": "2021-06-11T06:01:00.000Z",
"ID": "CVE-2021-28801",
"STATE": "PUBLIC",
"TITLE": "Out-of-Bounds Read Vulnerability in QSS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "QSS",
"version": {
"version_data": [
{
"platform": "QSW-M2108-2C",
"version_affected": "\u003c",
"version_value": "1.0.2 build 20210122"
},
{
"platform": "QSW-M2108-2S",
"version_affected": "\u003c",
"version_value": "1.0.2 build 20210122"
},
{
"platform": "QSW-M2108R-2C",
"version_affected": "\u003c",
"version_value": "1.0.2 build 20210122"
}
]
}
}
]
},
"vendor_name": "QNAP Systems Inc."
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Qian Chen from Codesafe Team of Legendsec at Qi\u0027anxin Group"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An out-of-bounds read vulnerability has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read sensitive information on the system. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.2 build 20210122 on QSW-M2108-2C; versions prior to 1.0.2 build 20210122 on QSW-M2108-2S; versions prior to 1.0.2 build 20210122 on QSW-M2108R-2C."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-125 Out-of-bounds Read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23",
"refsource": "MISC",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23"
}
]
},
"solution": [
{
"lang": "en",
"value": "QNAP have already fixed this vulnerability in the following versions:\n\nQSW-M2108-2C: QSS 1.0.2 build 20210122 and later\nQSW-M2108-2S: QSS 1.0.2 build 20210122 and later\nQSW-M2108R-2C: QSS 1.0.2 build 20210122 and later"
}
],
"source": {
"advisory": "QSA-21-23",
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
"assignerShortName": "qnap",
"cveId": "CVE-2021-28801",
"datePublished": "2021-06-11T06:35:14.369676Z",
"dateReserved": "2021-03-18T00:00:00",
"dateUpdated": "2024-09-17T00:06:25.170Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}