CVE-2024-38638
Published: 07 March 2025
Summary
CVE-2024-38638 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Qnap Quts Hero. Its CVSS base score is 7.2 (High).
Operationally, ranked in the top 40.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the out-of-bounds write vulnerability by requiring timely identification, testing, and installation of vendor patches as released by QNAP.
Implements memory safeguards such as address space layout randomization and data execution prevention to block exploitation of out-of-bounds writes even if unpatched.
Enforces least privilege on administrator accounts to limit the scope and impact of memory corruption by remote attackers with elevated access.
MITRE ATT&CK Enterprise TechniquesAI
Insufficient information to map techniques.NVD Description
An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory. QTS 5.2.x/QuTS hero h5.2.x are not affected. We…
more
have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QuTS hero h5.1.9.2954 build 20241120 and later
Deeper analysisAI
CVE-2024-38638 is an out-of-bounds write vulnerability (CWE-787) affecting several versions of QNAP's QTS and QuTS hero operating systems. The issue, published on 2025-03-07, carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). QTS 5.2.x and QuTS hero h5.2.x versions are not affected.
The vulnerability can be exploited by remote attackers who have already obtained administrator privileges. Exploitation allows them to modify or corrupt memory, potentially leading to high-impact consequences on confidentiality, integrity, and availability.
QNAP has released fixes for the vulnerability in QTS 5.1.9.2954 build 20241120 and later, as well as QuTS hero h5.1.9.2954 build 20241120 and later. Additional details are available in the vendor's security advisory at https://www.qnap.com/en/security-advisory/qsa-24-52.
Details
- CWE(s)