{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-32771","assignerOrgId":"2fd009eb-170a-4625-932b-17a53af1051f","state":"PUBLISHED","assignerShortName":"qnap","dateReserved":"2024-04-18T08:14:16.553Z","datePublished":"2024-09-06T16:27:12.908Z","dateUpdated":"2024-09-06T17:33:45.895Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"QTS","vendor":"QNAP Systems Inc.","versions":[{"lessThan":"5.2.0.2782 build 20240601","status":"affected","version":"5.1.x","versionType":"custom"},{"status":"unaffected","version":"5.0.x"},{"status":"unaffected","version":"4.5.x"}]},{"defaultStatus":"unaffected","product":"QuTS hero","vendor":"QNAP Systems Inc.","versions":[{"lessThan":"h5.2.0.2782 build 20240601","status":"affected","version":"h5.1.x","versionType":"custom"},{"status":"unaffected","version":"h5.0.x"},{"status":"unaffected","version":"h4.5.x"}]},{"defaultStatus":"unaffected","product":"QuTScloud","vendor":"QNAP Systems Inc.","versions":[{"status":"unaffected","version":"c5.0.x"}]}],"credits":[{"lang":"en","type":"finder","value":"Aliz Hammond of watchTowr"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An improper restriction of excessive authentication attempts vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow local network authenticated administrators to perform an arbitrary number of authentication attempts via unspecified vectors.<br>QuTScloud is not affected.<br><br>We have already fixed the vulnerability in the following versions:<br>QTS 5.2.0.2782 build 20240601 and later<br>QuTS hero h5.2.0.2782 build 20240601 and later<br>"}],"value":"An improper restriction of excessive authentication attempts vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow local network authenticated administrators to perform an arbitrary number of authentication attempts via unspecified vectors.\nQuTScloud is not affected.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.0.2782 build 20240601 and later\nQuTS hero h5.2.0.2782 build 20240601 and later"}],"impacts":[{"capecId":"CAPEC-49","descriptions":[{"lang":"en","value":"CAPEC-49"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":2.6,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-307","description":"CWE-307","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"2fd009eb-170a-4625-932b-17a53af1051f","shortName":"qnap","dateUpdated":"2024-09-06T16:27:12.908Z"},"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-24-28"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"We have already fixed the vulnerability in the following versions:<br>QTS 5.2.0.2782 build 20240601 and later<br>QuTS hero h5.2.0.2782 build 20240601 and later<br>"}],"value":"We have already fixed the vulnerability in the following versions:\nQTS 5.2.0.2782 build 20240601 and later\nQuTS hero h5.2.0.2782 build 20240601 and later"}],"source":{"advisory":"QSA-24-28","discovery":"EXTERNAL"},"title":"QTS, QuTS hero","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-06T17:33:38.869678Z","id":"CVE-2024-32771","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-06T17:33:45.895Z"}}]}}