Cyber Posture

CVE-2024-53693

HighRCE

Published: 07 March 2025

Published
07 March 2025
Modified
20 September 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
EPSS Score 0.0043 62.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-53693 is a high-severity CRLF Injection (CWE-93) vulnerability in Qnap Quts Hero. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked in the top 37.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper neutralization of CRLF sequences by requiring validation and sanitization of user inputs to prevent injection attacks.

prevent

Ensures timely remediation of the specific CRLF injection flaw through patching, as demonstrated by QNAP's release of fixed versions.

prevent

Restricts and filters user inputs to block CRLF sequences and other malicious patterns that could lead to application data modification.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

CRLF injection vuln with high availability impact (A:H) and ability to modify application data enables post-access exploitation for endpoint DoS via application/system exploitation.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

An improper neutralization of CRLF sequences ('CRLF Injection') vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to modify application data. We have already fixed…

more

the vulnerability in the following versions: QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.2.3.3006 build 20250108 and later

Deeper analysisAI

CVE-2024-53693 is an improper neutralization of CRLF sequences (CRLF Injection) vulnerability affecting several versions of QNAP operating systems, including QTS and QuTS hero. The issue stems from inadequate handling of CRLF sequences, as indicated by associated CWEs such as CWE-93, CWE-94, and CWE-400. It carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H), highlighting its potential for high availability impact with low complexity and privileges required.

Remote attackers who have already gained user-level access can exploit this vulnerability over the network without user interaction. Successful exploitation allows them to modify application data, potentially leading to disruptions aligned with the high availability impact in the CVSS score.

QNAP has addressed the vulnerability in updated versions: QTS 5.2.3.3006 build 20250108 and later, and QuTS hero h5.2.3.3006 build 20250108 and later. Additional details on mitigation and affected versions are available in the QNAP security advisory at https://www.qnap.com/en/security-advisory/qsa-24-54.

Details

CWE(s)

Affected Products

qnap
qts
5.2.0.2737, 5.2.0.2744, 5.2.0.2782, 5.2.0.2802, 5.2.0.2823
qnap
quts hero
h5.2.0.2737, h5.2.0.2782, h5.2.0.2789, h5.2.0.2802, h5.2.0.2823

CVEs Like This One

CVE-2025-52864Same product: Qnap Qts
CVE-2025-52863Same product: Qnap Qts
CVE-2025-48725Same product: Qnap Qts
CVE-2025-52872Same product: Qnap Qts
CVE-2025-66277Same product: Qnap Qts
CVE-2024-14026Same product: Qnap Qts
CVE-2024-53699Same product: Qnap Qts
CVE-2025-30264Same product: Qnap Qts
CVE-2024-13086Same product: Qnap Qts
CVE-2025-59385Same product: Qnap Qts

References