CVE-2023-23369
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
03/11/2023
Last modified:
15/11/2023
Description
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.<br />
<br />
We have already fixed the vulnerability in the following versions:<br />
Multimedia Console 2.1.2 ( 2023/05/04 ) and later<br />
Multimedia Console 1.4.8 ( 2023/05/05 ) and later<br />
QTS 5.1.0.2399 build 20230515 and later<br />
QTS 4.3.6.2441 build 20230621 and later<br />
QTS 4.3.4.2451 build 20230621 and later<br />
QTS 4.3.3.2420 build 20230621 and later<br />
QTS 4.2.6 build 20230621 and later<br />
Media Streaming add-on 500.1.1.2 ( 2023/06/12 ) and later<br />
Media Streaming add-on 500.0.0.11 ( 2023/06/16 ) and later<br />
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.0895:build_20190328:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.0907:build_20190409:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.0923:build_20190425:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.0944:build_20190516:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.0959:build_20190531:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.0979:build_20190620:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.0993:build_20190704:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.1013:build_20190724:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.1033:build_20190813:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.1070:build_20190919:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.1154:build_20191212:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.1218:build_20200214:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.1263:build_20200330:*:*:*:*:*:* | ||
| cpe:2.3:o:qnap:qts:4.3.6.1286:build_20200422:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



