{"containers":{"cna":{"affected":[{"platforms":["QTS 4.3.6"],"product":"HBS 3","vendor":"QNAP Systems Inc.","versions":[{"lessThan":"v3.0.210507","status":"affected","version":"unspecified","versionType":"custom"}]},{"platforms":["QTS 4.3.4"],"product":"HBS 3","vendor":"QNAP Systems Inc.","versions":[{"lessThan":"v3.0.210506","status":"affected","version":"unspecified","versionType":"custom"}]},{"platforms":["QTS 4.3.3"],"product":"HBS 3","vendor":"QNAP Systems Inc.","versions":[{"lessThan":"v3.0.210506","status":"affected","version":"unspecified","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Ta-Lun Yen of TXOne IoT/ICS Security Research Labs of Trend Micro working with Trend Micro’s Zero Day Initiative"}],"datePublic":"2021-07-08T00:00:00.000Z","descriptions":[{"lang":"en","value":"An improper access control vulnerability has been reported to affect certain legacy versions of HBS 3. If exploited, this vulnerability allows attackers to compromise the security of the operating system.QNAP have already fixed this vulnerability in the following versions of HBS 3: QTS 4.3.6: HBS 3 v3.0.210507 and later QTS 4.3.4: HBS 3 v3.0.210506 and later QTS 4.3.3: HBS 3 v3.0.210506 and later"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-284","description":"CWE-284 Improper Access Control","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-306","description":"CWE-306 Missing Authentication for Critical Function","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-749","description":"CWE-749 Exposed Dangerous Method or Function","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-07-08T13:06:11.000Z","orgId":"2fd009eb-170a-4625-932b-17a53af1051f","shortName":"qnap"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.qnap.com/en/security-advisory/qsa-21-19"},{"tags":["x_refsource_MISC"],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-783/"}],"solutions":[{"lang":"en","value":"QNAP have already fixed this vulnerability in the following versions of HBS 3:\nQTS 4.3.6: HBS 3 v3.0.210507 and later\nQTS 4.3.4: HBS 3 v3.0.210506 and later\nQTS 4.3.3: HBS 3 v3.0.210506 and later"}],"source":{"advisory":"QSA-21-19","discovery":"EXTERNAL"},"title":"Missing Authentication for Critical Function in RTRR Server in HBS3","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@qnap.com","DATE_PUBLIC":"2021-07-08T15:22:00.000Z","ID":"CVE-2021-28809","STATE":"PUBLIC","TITLE":"Missing Authentication for Critical Function in RTRR Server in HBS3"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"HBS 3","version":{"version_data":[{"platform":"QTS 4.3.6","version_affected":"<","version_value":"v3.0.210507"},{"platform":"QTS 4.3.4","version_affected":"<","version_value":"v3.0.210506"},{"platform":"QTS 4.3.3","version_affected":"<","version_value":"v3.0.210506"}]}}]},"vendor_name":"QNAP Systems Inc."}]}},"credit":[{"lang":"eng","value":"Ta-Lun Yen of TXOne IoT/ICS Security Research Labs of Trend Micro working with Trend Micro’s Zero Day Initiative"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An improper access control vulnerability has been reported to affect certain legacy versions of HBS 3. If exploited, this vulnerability allows attackers to compromise the security of the operating system.QNAP have already fixed this vulnerability in the following versions of HBS 3: QTS 4.3.6: HBS 3 v3.0.210507 and later QTS 4.3.4: HBS 3 v3.0.210506 and later QTS 4.3.3: HBS 3 v3.0.210506 and later"}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-284 Improper Access Control"}]},{"description":[{"lang":"eng","value":"CWE-306 Missing Authentication for Critical Function"}]},{"description":[{"lang":"eng","value":"CWE-749 Exposed Dangerous Method or Function"}]}]},"references":{"reference_data":[{"name":"https://www.qnap.com/en/security-advisory/qsa-21-19","refsource":"MISC","url":"https://www.qnap.com/en/security-advisory/qsa-21-19"},{"name":"https://www.zerodayinitiative.com/advisories/ZDI-21-783/","refsource":"MISC","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-783/"}]},"solution":[{"lang":"en","value":"QNAP have already fixed this vulnerability in the following versions of HBS 3:\nQTS 4.3.6: HBS 3 v3.0.210507 and later\nQTS 4.3.4: HBS 3 v3.0.210506 and later\nQTS 4.3.3: HBS 3 v3.0.210506 and later"}],"source":{"advisory":"QSA-21-19","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T21:55:11.617Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.qnap.com/en/security-advisory/qsa-21-19"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-783/"}]}]},"cveMetadata":{"assignerOrgId":"2fd009eb-170a-4625-932b-17a53af1051f","assignerShortName":"qnap","cveId":"CVE-2021-28809","datePublished":"2021-07-08T07:40:12.294Z","dateReserved":"2021-03-18T00:00:00.000Z","dateUpdated":"2024-09-17T00:36:54.377Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}