Overview
- Description
- An externally controlled reference to a resource vulnerability has been reported to affect QNAP NAS running Photo Station. If exploited, This could allow an attacker to modify system files. We have already fixed the vulnerability in the following versions: QTS 5.0.1: Photo Station 6.1.2 and later QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later QTS 4.3.6: Photo Station 5.7.18 and later QTS 4.3.3: Photo Station 5.4.15 and later QTS 4.2.6: Photo Station 5.2.14 and later
- Source
- security@qnapsecurity.com.tw
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
- Severity
- CRITICAL
Known exploits
Data from CISA
- Vulnerability name
- QNAP Photo Station Externally Controlled Reference Vulnerability
- Exploit added on
- Sep 8, 2022
- Exploit action due
- Sep 29, 2022
- Required action
- Apply updates per vendor instructions.
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:qts:4.2.6:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1D9E6F8F-A433-45A7-8839-5D478FE179A4" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "334FA052-177C-4583-9919-BB4EB9DC91A1", "versionEndExcluding": "5.2.14" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:qts:4.3.3:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C5994C07-17FE-4784-9FA4-9675BA8B4743" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2416B1E4-88F1-4601-AC15-D11B7BB9EB7D", "versionEndExcluding": "5.4.15" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:qts:4.3.6:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FE9FAC96-AA2A-4CA5-A170-8C0E6BD47391" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF59D0C3-74CF-448A-935D-7C436330ABFD", "versionEndExcluding": "5.7.18" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "36C84C4C-AAE2-4AC5-A723-64271BBB91A5", "versionEndIncluding": "4.5.4.2012", "versionStartIncluding": "4.5.1" }, { "criteria": "cpe:2.3:o:qnap:qts:5.0.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DC98874F-5D92-481D-B4E2-EC548727719C" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12A590AE-13D5-4F8F-802D-4331B63D5C0C", "versionEndExcluding": "6.0.22" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:qts:5.0.1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B21E1993-94A3-4D65-ADB7-70DDB919AF8D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCB176FD-5FC1-4003-B336-6B51D8AC36DD", "versionEndExcluding": "6.1.2" } ], "operator": "OR" } ], "operator": "AND" } ]