CVE-2024-32771
Published Sep 6, 2024
Last updated 2 months ago
Overview
- Description
- An improper restriction of excessive authentication attempts vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow local network authenticated administrators to perform an arbitrary number of authentication attempts via unspecified vectors. QuTScloud is not affected. We have already fixed the vulnerability in the following versions: QTS 5.2.0.2782 build 20240601 and later QuTS hero h5.2.0.2782 build 20240601 and later
- Source
- security@qnapsecurity.com.tw
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 2.4
- Impact score
- 1.4
- Exploitability score
- 0.9
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
- Severity
- LOW
Weaknesses
- security@qnapsecurity.com.tw
- CWE-307
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39382CBA-EA68-426A-AC07-A9A26E722CAB" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCB37C08-1DF7-4AF4-9BB1-C562E5643B5A" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8368130C-F26D-41FE-8D78-B103A23B5327" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E0EE181-78AF-4C3C-90A4-C69A2DE6E176" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56E3AE06-78DA-4844-ADC1-09A35F1C5B54" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2AA7A32-0DA8-4417-A23E-C4F563BC7819" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.2.2533:build_20230926:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80E7C17C-ED6D-439D-A1F3-1870A3ADA926" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.3.2578:build_20231110:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "636C2D9C-C837-4FAC-B79D-1CA7A7C1FF3E" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.4.2596:build_20231128:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "866B455B-0266-4990-920B-A06756ED5A61" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.5.2645:build_20240116:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3B5C4C5-5EE2-4E6F-927E-1D52A04895BB" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.5.2679:build_20240219:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "543E17BB-B552-4B65-B028-BE9A47E6F34B" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.6.2722:build_20240402:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEDC247A-96D9-4140-AA72-52E4EEDC2121" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.7.2770:build_20240520:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDEF21B3-275E-446B-A6C4-FD30A567B600" }, { "criteria": "cpe:2.3:o:qnap:qts:5.1.8.2823:build_20240712:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A0C7EC7-A0A4-4100-927A-0D673F784502" }, { "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7" }, { "criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CA398A8-EBDF-4D41-B15E-7B763F885021" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F63A5ED2-ECC2-49A0-BFA9-548E35ACD6C7" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53387FAC-7BE0-47D7-99BF-2B1F03C17CC3" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4226394-0023-4CD2-BB89-77251BF92FF3" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "646257F7-D4A4-43B0-91F2-7850338B3CA1" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:build_20230927:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88825AE1-B006-4F7F-BD90-D4B1CF1251A3" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.3.2578:build_20231110:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F471666-4919-4770-956E-ACE4C55D29DB" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.4.2596:build_20231128:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9573F671-D49E-438A-B72C-DFC390A79093" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.5.2647:build_20240118:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75E7938F-943F-428D-974D-42E790829F88" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.5.2680:build_20240220:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12F5732D-C95F-45D1-968C-C2269DFDF6D4" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.6.2734:build_20240414:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94734596-A56A-4128-A39A-7E22FBD17835" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2770:build_20240520:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACF87C5E-9508-4BA9-9218-3CBD8A8439A4" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2788:build_20240607:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67E8977A-2363-4855-B284-6EBF8FB485A2" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2794:build_20240613:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A268686-341F-4E13-8CE6-493DE7E9CF70" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.8.2823:build_20240712:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D57D3028-1713-4530-A1EC-6D13A0E010C3" }, { "criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481" } ], "operator": "OR" } ] } ]