Cyber Posture

CVE-2024-38638

High

Published: 07 March 2025

Published
07 March 2025
Modified
23 September 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0038 59.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-38638 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Qnap Quts Hero. Its CVSS base score is 7.2 (High).

Operationally, ranked in the top 40.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the out-of-bounds write vulnerability by requiring timely identification, testing, and installation of vendor patches as released by QNAP.

prevent

Implements memory safeguards such as address space layout randomization and data execution prevention to block exploitation of out-of-bounds writes even if unpatched.

prevent

Enforces least privilege on administrator accounts to limit the scope and impact of memory corruption by remote attackers with elevated access.

MITRE ATT&CK Enterprise TechniquesAI

Insufficient information to map techniques.
Confidence: LOW · MITRE ATT&CK Enterprise v19.0

NVD Description

An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory. QTS 5.2.x/QuTS hero h5.2.x are not affected. We…

more

have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QuTS hero h5.1.9.2954 build 20241120 and later

Deeper analysisAI

CVE-2024-38638 is an out-of-bounds write vulnerability (CWE-787) affecting several versions of QNAP's QTS and QuTS hero operating systems. The issue, published on 2025-03-07, carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). QTS 5.2.x and QuTS hero h5.2.x versions are not affected.

The vulnerability can be exploited by remote attackers who have already obtained administrator privileges. Exploitation allows them to modify or corrupt memory, potentially leading to high-impact consequences on confidentiality, integrity, and availability.

QNAP has released fixes for the vulnerability in QTS 5.1.9.2954 build 20241120 and later, as well as QuTS hero h5.1.9.2954 build 20241120 and later. Additional details are available in the vendor's security advisory at https://www.qnap.com/en/security-advisory/qsa-24-52.

Details

CWE(s)

Affected Products

qnap
qts
5.1.0.2348, 5.1.0.2399, 5.1.0.2418, 5.1.0.2444, 5.1.0.2466
qnap
quts hero
h5.1.0.2409, h5.1.0.2424, h5.1.0.2453, h5.1.0.2466, h5.1.1.2488

CVEs Like This One

CVE-2024-53699Same product: Qnap Qts
CVE-2024-53697Same product: Qnap Qts
CVE-2025-30273Same product: Qnap Qts
CVE-2025-66277Same product: Qnap Qts
CVE-2024-53693Same product: Qnap Qts
CVE-2024-14026Same product: Qnap Qts
CVE-2025-52864Same product: Qnap Qts
CVE-2025-30264Same product: Qnap Qts
CVE-2024-13086Same product: Qnap Qts
CVE-2025-59385Same product: Qnap Qts

References