{
    "dataType": "CVE_RECORD",
    "dataVersion": "5.1",
    "cveMetadata": {
        "cveId": "CVE-2024-14026",
        "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "requesterUserId": "00000000-0000-4000-9000-000000000000",
        "serial": 1,
        "state": "PUBLISHED"
    },
    "containers": {
        "cna": {
            "providerMetadata": {
                "orgId": "2fd009eb-170a-4625-932b-17a53af1051f"
            },
            "title": "QTS, QuTS hero",
            "problemTypes": [
                {
                    "descriptions": [
                        {
                            "lang": "en",
                            "cweId": "CWE-78",
                            "description": "CWE-78",
                            "type": "CWE"
                        }
                    ]
                }
            ],
            "impacts": [
                {
                    "capecId": "CAPEC-88",
                    "descriptions": [
                        {
                            "lang": "en",
                            "value": "CAPEC-88"
                        }
                    ]
                }
            ],
            "affected": [
                {
                    "vendor": "QNAP Systems Inc.",
                    "product": "QTS",
                    "versions": [
                        {
                            "status": "affected",
                            "version": "5.1.x",
                            "lessThan": "5.1.9.2954 build 20241120",
                            "versionType": "custom"
                        },
                        {
                            "status": "affected",
                            "version": "5.2.x",
                            "lessThan": "5.2.3.3006 build 20250108",
                            "versionType": "custom"
                        }
                    ],
                    "defaultStatus": "unaffected"
                },
                {
                    "vendor": "QNAP Systems Inc.",
                    "product": "QuTS hero",
                    "versions": [
                        {
                            "status": "affected",
                            "version": "h5.1.x",
                            "lessThan": "h5.1.9.2954 build 20241120",
                            "versionType": "custom"
                        },
                        {
                            "status": "affected",
                            "version": "h5.2.x",
                            "lessThan": "h5.2.3.3006 build 20250108",
                            "versionType": "custom"
                        }
                    ],
                    "defaultStatus": "unaffected"
                }
            ],
            "descriptions": [
                {
                    "lang": "en",
                    "value": "A command injection vulnerability has been reported to affect several QNAP operating system versions. If an attacker gains local network access who have also gained a user account, they can then exploit the vulnerability to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.3.3006 build 20250108 and later",
                    "supportingMedia": [
                        {
                            "type": "text/html",
                            "base64": false,
                            "value": "A command injection vulnerability has been reported to affect several QNAP operating system versions. If an attacker gains local network access who have also gained a user account, they can then exploit the vulnerability to execute arbitrary commands.<br><br>We have already fixed the vulnerability in the following versions:<br>QTS 5.1.9.2954 build 20241120 and later<br>QTS 5.2.3.3006 build 20250108 and later<br>QuTS hero h5.1.9.2954 build 20241120 and later<br>QuTS hero h5.2.3.3006 build 20250108 and later<br>"
                        }
                    ]
                }
            ],
            "references": [
                {
                    "url": "https://www.qnap.com/en/security-advisory/qsa-24-57"
                }
            ],
            "metrics": [
                {
                    "format": "CVSS",
                    "scenarios": [
                        {
                            "lang": "en",
                            "value": "GENERAL"
                        }
                    ],
                    "cvssV4_0": {
                        "attackVector": "PHYSICAL",
                        "attackComplexity": "LOW",
                        "attackRequirements": "PRESENT",
                        "privilegesRequired": "LOW",
                        "userInteraction": "ACTIVE",
                        "vulnConfidentialityImpact": "HIGH",
                        "subConfidentialityImpact": "NONE",
                        "vulnIntegrityImpact": "HIGH",
                        "subIntegrityImpact": "NONE",
                        "vulnAvailabilityImpact": "HIGH",
                        "subAvailabilityImpact": "NONE",
                        "exploitMaturity": "UNREPORTED",
                        "Safety": "NOT_DEFINED",
                        "Automatable": "NOT_DEFINED",
                        "Recovery": "NOT_DEFINED",
                        "valueDensity": "NOT_DEFINED",
                        "vulnerabilityResponseEffort": "NOT_DEFINED",
                        "providerUrgency": "NOT_DEFINED",
                        "version": "4.0",
                        "baseSeverity": "LOW",
                        "baseScore": 2,
                        "vectorString": "CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U"
                    }
                }
            ],
            "solutions": [
                {
                    "lang": "en",
                    "value": "We have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.1.9.2954 build 20241120 and later\nQuTS hero h5.2.3.3006 build 20250108 and later",
                    "supportingMedia": [
                        {
                            "type": "text/html",
                            "base64": false,
                            "value": "We have already fixed the vulnerability in the following versions:<br>QTS 5.1.9.2954 build 20241120 and later<br>QTS 5.2.3.3006 build 20250108 and later<br>QuTS hero h5.1.9.2954 build 20241120 and later<br>QuTS hero h5.2.3.3006 build 20250108 and later<br>"
                        }
                    ]
                }
            ],
            "source": {
                "advisory": "QSA-24-57",
                "discovery": "EXTERNAL"
            },
            "x_generator": {
                "engine": "Vulnogram 0.1.0-dev"
            }
        }
    }
}