CVE-2025-52867
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-10-03
Last updated on: 2025-10-08
Assigner: QNAP Systems, Inc.
Description
Description
An uncontrolled resource consumption vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.
We have already fixed the vulnerability in the following version:
Qsync Central 5.0.0.2 ( 2025/07/31 ) and later
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qnap | qsync_central | From 5.0.0.0 (inc) to 5.0.0.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an uncontrolled resource consumption issue in Qsync Central. If a remote attacker obtains a user account, they can exploit this flaw to launch a denial-of-service (DoS) attack against the system.
How can this vulnerability impact me? :
The vulnerability can allow an attacker with a user account to cause a denial-of-service (DoS) attack, potentially making the Qsync Central service unavailable or severely degraded.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update Qsync Central to version 5.0.0.2 (released on 2025/07/31) or later.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70