--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Multiple Vulnerabilities in QNAP Products' number: '2024-049' version: '1.0' original_date: 'May 21, 2024' date: 'May 22, 2024' --- _History:_ * _22/05/2024 --- v1.0 -- Initial publication_ # Summary On May 21, 2024, QNAP released a security advisory addressing multiple flaws, including a zero-day vulnerability in the shared feature of QTS [1,2,3]. These vulnerabilities could allow remote attackers to execute arbitrary code. It is strongly advised updating affected systems to the latest versions to mitigate these risks. # Technical Details The vulnerability **CVE-2024-27130**, with a CVSS score of 7.2, is due to improper input validation in the shared feature of QTS that could allow remote attackers to execute arbitrary code. An attacker can exploit the vulnerability through a specially crafted request that causes a buffer overflow, leading to remote code execution. Successful exploitation requires access to a specific parameter [1,2]. # Affected Products - QTS QTS 5.1.x (fixed version is QTS 5.1.7.2770 build 20240520 and later) [3]; - QuTS hero h5.1.x (fixed version is QuTS hero h5.1.7.2770 build 20240520 and later) [3]. # Recommendations It is strongly recommended updating affected devices to a fixed version. # References [1] [2] [3]