{"containers":{"cna":{"affected":[{"platforms":["build 20180711"],"product":"QTS","vendor":"QNAP Systems Inc.","versions":[{"lessThanOrEqual":"4.2.6","status":"affected","version":"unspecified","versionType":"custom"}]},{"platforms":["build 20180725"],"product":"QTS","vendor":"QNAP Systems Inc.","versions":[{"lessThanOrEqual":"4.3.3","status":"affected","version":"unspecified","versionType":"custom"}]},{"platforms":["build 20180710"],"product":"QTS","vendor":"QNAP Systems Inc.","versions":[{"lessThanOrEqual":"4.3.4","status":"affected","version":"unspecified","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Yuki, security researcher"}],"datePublic":"2018-09-20T00:00:00.000Z","descriptions":[{"lang":"en","value":"Buffer Overflow vulnerability in NAS devices. QTS allows attackers to run arbitrary code. This issue affects: QNAP Systems Inc. QTS version 4.2.6 and prior versions on build 20180711; version 4.3.3 and prior versions on build 20180725; version 4.3.4 and prior versions on build 20180710."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-120","description":"CWE-120 Buffer Overflow","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-01-16T15:21:43.000Z","orgId":"2fd009eb-170a-4625-932b-17a53af1051f","shortName":"qnap"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.qnap.com/zh-tw/security-advisory/nas-201809-20"}],"source":{"discovery":"UNKNOWN"},"title":"Security Advisory for Vulnerabilities in QTS","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@qnap.com","ID":"CVE-2018-0721","STATE":"PUBLIC","TITLE":"Security Advisory for Vulnerabilities in QTS"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"QTS","version":{"version_data":[{"platform":"build 20180711","version_affected":"<=","version_value":"4.2.6"},{"platform":"build 20180725","version_affected":"<=","version_value":"4.3.3"},{"platform":"build 20180710","version_affected":"<=","version_value":"4.3.4"}]}}]},"vendor_name":"QNAP Systems Inc."}]}},"credit":[{"lang":"eng","value":"Yuki, security researcher"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer Overflow vulnerability in NAS devices. QTS allows attackers to run arbitrary code. This issue affects: QNAP Systems Inc. QTS version 4.2.6 and prior versions on build 20180711; version 4.3.3 and prior versions on build 20180725; version 4.3.4 and prior versions on build 20180710."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-120 Buffer Overflow"}]}]},"references":{"reference_data":[{"name":"https://www.qnap.com/zh-tw/security-advisory/nas-201809-20","refsource":"CONFIRM","url":"https://www.qnap.com/zh-tw/security-advisory/nas-201809-20"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T03:35:49.256Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.qnap.com/zh-tw/security-advisory/nas-201809-20"}]}]},"cveMetadata":{"assignerOrgId":"2fd009eb-170a-4625-932b-17a53af1051f","assignerShortName":"qnap","cveId":"CVE-2018-0721","datePublished":"2018-11-27T22:00:00.000Z","dateReserved":"2017-11-28T00:00:00.000Z","dateUpdated":"2024-08-05T03:35:49.256Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}