{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-38644","assignerOrgId":"2fd009eb-170a-4625-932b-17a53af1051f","state":"PUBLISHED","assignerShortName":"qnap","dateReserved":"2024-06-19T00:17:01.279Z","datePublished":"2024-11-22T15:32:31.923Z","dateUpdated":"2024-11-22T16:50:56.156Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Notes Station 3","vendor":"QNAP Systems Inc.","versions":[{"lessThan":"3.9.7","status":"affected","version":"3.9.x","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Thomas Fady"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An OS command injection vulnerability has been reported to affect Notes Station 3. If exploited, the vulnerability could allow remote authenticated attackers to execute commands.<br><br>We have already fixed the vulnerability in the following version:<br>Notes Station 3 3.9.7 and later<br>"}],"value":"An OS command injection vulnerability has been reported to affect Notes Station 3. If exploited, the vulnerability could allow remote authenticated attackers to execute commands.\n\nWe have already fixed the vulnerability in the following version:\nNotes Station 3 3.9.7 and later"}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-77","description":"CWE-77","lang":"en","type":"CWE"},{"cweId":"CWE-78","description":"CWE-78","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"2fd009eb-170a-4625-932b-17a53af1051f","shortName":"qnap","dateUpdated":"2024-11-22T15:32:31.923Z"},"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-24-36"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"We have already fixed the vulnerability in the following version:<br>Notes Station 3 3.9.7 and later<br>"}],"value":"We have already fixed the vulnerability in the following version:\nNotes Station 3 3.9.7 and later"}],"source":{"advisory":"QSA-24-36","discovery":"EXTERNAL"},"title":"Notes Station 3","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"affected":[{"vendor":"qnap","product":"notes_station_3","cpes":["cpe:2.3:a:qnap:notes_station_3:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"3.9.0","status":"affected","lessThan":"3.9.7","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-22T16:50:46.024700Z","id":"CVE-2024-38644","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-22T16:50:56.156Z"}}]}}