vulnerability
QNAP QTS: CVE-2024-50405: Multiple Vulnerabilities in QTS and QuTS hero
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:M/C:N/I:P/A:P) | Mar 8, 2025 | Aug 4, 2025 | Mar 25, 2026 |
Severity
5
CVSS
(AV:N/AC:L/Au:M/C:N/I:P/A:P)
Published
Mar 8, 2025
Added
Aug 4, 2025
Modified
Mar 25, 2026
Description
Multiple vulnerabilities have been reported to affect certain QNAP operating system versions: CVE-2024-50405: If exploited, the improper neutralization of CRLF sequences ('CRLF Injection') vulnerability could allow remote attackers who have gained administrator access to modify application data. CVE-2024-53692: If exploited, the command injection vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands. CVE-2024-53693: If exploited, the improper neutralization of CRLF sequences ('CRLF Injection') vulnerability could allow remote attackers who have gained user access to modify application data. CVE-2024-53697, CVE-2024-53699: If exploited, the out-of-bounds write vulnerabilities could allow remote attackers who have gained administrator access to modify or corrupt memory. CVE-2024-53698: If exploited, the double free vulnerability could allow remote attackers who have gained administrator access to modify memory. CVE-2024-14026: If an attacker gains local network access and has also gained a user account, they can then exploit the command injection vulnerability to execute arbitrary commands. We have already fixed the vulnerabilities in the following versions:
Solution
qnap-qts-upgrade-latest
References
- CWE-93
- CWE-94
- CVE-2024-50405
- https://attackerkb.com/topics/CVE-2024-50405
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50405
- https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-50405
- https://www.qnap.com/en-uk/security-advisory/QSA-24-54
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-54223
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.