Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-50358
PUBLISHED
More InfoOfficial Page
Assigner-qnap
Assigner Org ID-2fd009eb-170a-4625-932b-17a53af1051f
View Known Exploited Vulnerability (KEV) details
Published At-13 Feb, 2024 | 02:45
Updated At-09 May, 2025 | 18:16
Rejected At-
▼CVE Numbering Authority (CNA)
QTS, QuTS hero, QuTScloud

An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QTS 4.5.4.2627 build 20231225 and later QTS 4.3.6.2665 build 20240131 and later QTS 4.3.4.2675 build 20240131 and later QTS 4.3.3.2644 build 20240131 and later QTS 4.2.6 build 20240131 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later

Affected Products
Vendor
QNAP Systems, Inc.QNAP Systems Inc.
Product
QTS
Default Status
unaffected
Versions
Affected
  • From 5.x before 5.1.5.2645 build 20240116 (custom)
  • From 4.5.x, 4.4.x before 4.5.4.2627 build 20231225 (custom)
  • From 4.3.6, 4.3.5 before 4.3.6.2665 build 20240131 (custom)
  • From 4.3.4 before 4.3.4.2675 build 20240131 (custom)
  • From 4.3.x before 4.3.3.2644 build 20240131 (custom)
  • From 4.2.x before 4.2.6 build 20240131 (custom)
Vendor
QNAP Systems, Inc.QNAP Systems Inc.
Product
QuTS hero
Default Status
unaffected
Versions
Affected
  • From h5.x before h5.1.5.2647 build 20240118 (custom)
  • From h4.x before h4.5.4.2626 build 20231225 (custom)
Vendor
QNAP Systems, Inc.QNAP Systems Inc.
Product
QuTScloud
Default Status
unaffected
Versions
Affected
  • From c5.x before c5.1.5.2651 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78
Metrics
VersionBase scoreBase severityVector
3.15.8MEDIUM
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-88CAPEC-88
Solutions

We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QTS 4.5.4.2627 build 20231225 and later QTS 4.3.6.2665 build 20240131 and later QTS 4.3.4.2675 build 20240131 and later QTS 4.3.3.2644 build 20240131 and later QTS 4.2.6 build 20240131 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later

Configurations

Workarounds

Exploits

Credits

finder
Palo Alto Networks Unit 42
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.qnap.com/en/security-advisory/qsa-23-57
N/A
https://unit42.paloaltonetworks.com/qnap-qts-firmware-cve-2023-50358/
N/A
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032
N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.qnap.com/en/security-advisory/qsa-23-57
x_transferred
https://unit42.paloaltonetworks.com/qnap-qts-firmware-cve-2023-50358/
x_transferred
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found