CVE-2024-53699
Published: 07 March 2025
Summary
CVE-2024-53699 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Qnap Quts Hero. Its CVSS base score is 7.2 (High).
Operationally, ranked in the top 40.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely identification, reporting, and patching of flaws like this out-of-bounds write vulnerability, aligning with QNAP's fixed releases.
Implements memory protection safeguards such as address space layout randomization and data execution prevention to block exploitation of out-of-bounds writes leading to corruption.
Enforces least privilege to minimize the number of administrator accounts that could be used by attackers to remotely exploit the memory corruption vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Insufficient information to map techniques.NVD Description
An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory. We have already fixed the vulnerability in the…
more
following versions: QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.2.3.3006 build 20250108 and later
Deeper analysisAI
CVE-2024-53699 is an out-of-bounds write vulnerability (CWE-787) affecting several versions of QNAP operating systems, including QTS and QuTS hero prior to their respective patched releases. The flaw enables memory corruption when exploited, as detailed in the CVE description published on 2025-03-07.
Remote attackers who have already gained administrator privileges (PR:H) can exploit this vulnerability over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows high-impact modification or corruption of memory, resulting in confidentiality, integrity, and availability impacts scored at CVSS 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
QNAP's security advisory (QSA-24-54) confirms the issue has been addressed in QTS 5.2.3.3006 build 20250108 and later, as well as QuTS hero h5.2.3.3006 build 20250108 and later. Security practitioners should prioritize updating affected QNAP NAS devices to these versions for mitigation.
Details
- CWE(s)