Search criteria

558 vulnerabilities found for quts_hero by qnap

FKIE_CVE-2025-53407

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 16:00
Summary
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-53407",
  "lastModified": "2025-10-08T16:00:09.173",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:48.700",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52866

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:32
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52866",
  "lastModified": "2025-10-08T19:32:55.453",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:48.233",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-53406

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 16:05
Summary
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-53406",
  "lastModified": "2025-10-08T16:05:14.667",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:48.543",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52862

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:32
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52862",
  "lastModified": "2025-10-08T19:32:44.073",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:48.080",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52860

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:32
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52860",
  "lastModified": "2025-10-08T19:32:33.530",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:47.923",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52857

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:29
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52857",
  "lastModified": "2025-10-08T19:29:39.890",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:47.467",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52859

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:30
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52859",
  "lastModified": "2025-10-08T19:30:00.593",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:47.770",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52855

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:21
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52855",
  "lastModified": "2025-10-08T19:21:04.507",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:47.293",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52854

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:40
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52854",
  "lastModified": "2025-10-08T19:40:49.457",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:47.143",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52858

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:29
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52858",
  "lastModified": "2025-10-08T19:29:51.430",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:47.620",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52853

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:40
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52853",
  "lastModified": "2025-10-08T19:40:39.317",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:46.960",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52432

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:40
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later and later QuTS hero h5.2.6.3195 build 20250715 and later QuTS hero h5.3.0.3192 build 20250716 and later
Impacted products
Vendor Product Version
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\n  and later\nQuTS hero h5.2.6.3195 build 20250715 and later\nQuTS hero h5.3.0.3192 build 20250716 and later"
    }
  ],
  "id": "CVE-2025-52432",
  "lastModified": "2025-10-08T19:40:17.940",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:46.120",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52433

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:40
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52433",
  "lastModified": "2025-10-08T19:40:24.693",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:46.273",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-48730

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:53
Summary
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-48730",
  "lastModified": "2025-10-08T19:53:41.647",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:45.180",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-48729

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:45
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-48729",
  "lastModified": "2025-10-08T19:45:17.747",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:45.030",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52428

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:40
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52428",
  "lastModified": "2025-10-08T19:40:09.463",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:45.830",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52424

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:37
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52424",
  "lastModified": "2025-10-08T19:37:12.980",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:45.513",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52429

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:53
Summary
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52429",
  "lastModified": "2025-10-08T19:53:30.590",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:45.977",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-52427

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:40
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-52427",
  "lastModified": "2025-10-08T19:40:02.720",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:45.680",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-48728

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:45
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-48728",
  "lastModified": "2025-10-08T19:45:24.627",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:44.750",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-47214

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:46
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\n  and later"
    }
  ],
  "id": "CVE-2025-47214",
  "lastModified": "2025-10-08T19:46:54.927",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:44.270",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-47213

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:47
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-47213",
  "lastModified": "2025-10-08T19:47:02.440",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:44.110",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-48726

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:46
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-48726",
  "lastModified": "2025-10-08T19:46:45.050",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:44.423",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-48727

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:45
Summary
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-48727",
  "lastModified": "2025-10-08T19:45:31.630",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:44.577",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-47211

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:54
Summary
A path traversal vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A path traversal vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-47211",
  "lastModified": "2025-10-08T19:54:04.707",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 6.9,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "NONE",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:43.800",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-47212

Vulnerability from fkie_nvd - Published: 2025-10-03 19:15 - Updated: 2025-10-08 19:53
Summary
A command injection vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
Impacted products
Vendor Product Version
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
              "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
              "matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
              "matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
              "matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
              "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
              "matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
              "matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
              "matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
              "matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
              "matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
              "matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
              "matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
              "matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
              "matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
              "matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
              "matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
              "matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A command injection vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
    }
  ],
  "id": "CVE-2025-47212",
  "lastModified": "2025-10-08T19:53:54.947",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "LOW",
          "vulnIntegrityImpact": "LOW",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@qnapsecurity.com.tw",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-03T19:15:43.957",
  "references": [
    {
      "source": "security@qnapsecurity.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
    }
  ],
  "sourceIdentifier": "security@qnapsecurity.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "security@qnapsecurity.com.tw",
      "type": "Secondary"
    }
  ]
}

CVE-2025-53407 (GCVE-0-2025-53407)

Vulnerability from cvelistv5 – Published: 2025-10-03 18:14 – Updated: 2025-10-03 19:09
VLAI?
Summary
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
CWE
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QTS Affected: 5.2.x , < 5.2.6.3195 build 20250715 (custom)
Create a notification for this product.
    QNAP Systems Inc. QuTS hero Affected: h5.2.x , < h5.2.6.3195 build 20250715 (custom)
Create a notification for this product.
Credits
coral
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-53407",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-03T19:03:30.836440Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-03T19:09:52.630Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QTS",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "5.2.6.3195 build 20250715",
              "status": "affected",
              "version": "5.2.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "QuTS hero",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "h5.2.6.3195 build 20250715",
              "status": "affected",
              "version": "h5.2.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "coral"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.2.6.3195 build 20250715 and later\u003cbr\u003eQuTS hero h5.2.6.3195 build 20250715 and later\u003cbr\u003e"
            }
          ],
          "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-135",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-135"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-134",
              "description": "CWE-134",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-03T18:14:42.829Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.2.6.3195 build 20250715 and later\u003cbr\u003eQuTS hero h5.2.6.3195 build 20250715 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-36",
        "discovery": "EXTERNAL"
      },
      "title": "QTS, QuTS hero",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2025-53407",
    "datePublished": "2025-10-03T18:14:42.829Z",
    "dateReserved": "2025-06-30T07:19:56.928Z",
    "dateUpdated": "2025-10-03T19:09:52.630Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-53406 (GCVE-0-2025-53406)

Vulnerability from cvelistv5 – Published: 2025-10-03 18:14 – Updated: 2025-10-03 19:10
VLAI?
Summary
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
CWE
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QTS Affected: 5.2.x , < 5.2.6.3195 build 20250715 (custom)
Create a notification for this product.
    QNAP Systems Inc. QuTS hero Affected: h5.2.x , < h5.2.6.3195 build 20250715 (custom)
Create a notification for this product.
Credits
coral
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-53406",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-03T19:03:40.381301Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-03T19:10:06.668Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QTS",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "5.2.6.3195 build 20250715",
              "status": "affected",
              "version": "5.2.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "QuTS hero",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "h5.2.6.3195 build 20250715",
              "status": "affected",
              "version": "h5.2.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "coral"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.2.6.3195 build 20250715 and later\u003cbr\u003eQuTS hero h5.2.6.3195 build 20250715 and later\u003cbr\u003e"
            }
          ],
          "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-135",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-135"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-134",
              "description": "CWE-134",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-03T18:14:36.797Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.2.6.3195 build 20250715 and later\u003cbr\u003eQuTS hero h5.2.6.3195 build 20250715 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-36",
        "discovery": "EXTERNAL"
      },
      "title": "QTS, QuTS hero",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2025-53406",
    "datePublished": "2025-10-03T18:14:36.797Z",
    "dateReserved": "2025-06-30T07:19:56.928Z",
    "dateUpdated": "2025-10-03T19:10:06.668Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-53407 (GCVE-0-2025-53407)

Vulnerability from nvd – Published: 2025-10-03 18:14 – Updated: 2025-10-03 19:09
VLAI?
Summary
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
CWE
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QTS Affected: 5.2.x , < 5.2.6.3195 build 20250715 (custom)
Create a notification for this product.
    QNAP Systems Inc. QuTS hero Affected: h5.2.x , < h5.2.6.3195 build 20250715 (custom)
Create a notification for this product.
Credits
coral
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-53407",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-03T19:03:30.836440Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-03T19:09:52.630Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QTS",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "5.2.6.3195 build 20250715",
              "status": "affected",
              "version": "5.2.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "QuTS hero",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "h5.2.6.3195 build 20250715",
              "status": "affected",
              "version": "h5.2.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "coral"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.2.6.3195 build 20250715 and later\u003cbr\u003eQuTS hero h5.2.6.3195 build 20250715 and later\u003cbr\u003e"
            }
          ],
          "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-135",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-135"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-134",
              "description": "CWE-134",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-03T18:14:42.829Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.2.6.3195 build 20250715 and later\u003cbr\u003eQuTS hero h5.2.6.3195 build 20250715 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-36",
        "discovery": "EXTERNAL"
      },
      "title": "QTS, QuTS hero",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2025-53407",
    "datePublished": "2025-10-03T18:14:42.829Z",
    "dateReserved": "2025-06-30T07:19:56.928Z",
    "dateUpdated": "2025-10-03T19:09:52.630Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-53406 (GCVE-0-2025-53406)

Vulnerability from nvd – Published: 2025-10-03 18:14 – Updated: 2025-10-03 19:10
VLAI?
Summary
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
CWE
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QTS Affected: 5.2.x , < 5.2.6.3195 build 20250715 (custom)
Create a notification for this product.
    QNAP Systems Inc. QuTS hero Affected: h5.2.x , < h5.2.6.3195 build 20250715 (custom)
Create a notification for this product.
Credits
coral
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-53406",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-03T19:03:40.381301Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-03T19:10:06.668Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QTS",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "5.2.6.3195 build 20250715",
              "status": "affected",
              "version": "5.2.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "QuTS hero",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "h5.2.6.3195 build 20250715",
              "status": "affected",
              "version": "h5.2.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "coral"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.2.6.3195 build 20250715 and later\u003cbr\u003eQuTS hero h5.2.6.3195 build 20250715 and later\u003cbr\u003e"
            }
          ],
          "value": "A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-135",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-135"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-134",
              "description": "CWE-134",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-03T18:14:36.797Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-36"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQTS 5.2.6.3195 build 20250715 and later\u003cbr\u003eQuTS hero h5.2.6.3195 build 20250715 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.2.6.3195 build 20250715 and later\nQuTS hero h5.2.6.3195 build 20250715 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-36",
        "discovery": "EXTERNAL"
      },
      "title": "QTS, QuTS hero",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2025-53406",
    "datePublished": "2025-10-03T18:14:36.797Z",
    "dateReserved": "2025-06-30T07:19:56.928Z",
    "dateUpdated": "2025-10-03T19:10:06.668Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}