{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"QTS versions 5.x ant\u00e9rieures \u00e0 5.0.0.2131 build 20220815","product":{"name":"QTS","vendor":{"name":"Qnap","scada":false}}},{"description":"QTS versions ant\u00e9rieures \u00e0 4.5.4.2125 build 20220810","product":{"name":"QTS","vendor":{"name":"Qnap","scada":false}}},{"description":"QuTS hero h5.0.x et h4.5.x","product":{"name":"QTS","vendor":{"name":"Qnap","scada":false}}},{"description":"QuTScloud c5.0.1","product":{"name":"QTS","vendor":{"name":"Qnap","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-32746","url":"https://www.cve.org/CVERecord?id=CVE-2022-32746"},{"name":"CVE-2022-30522","url":"https://www.cve.org/CVERecord?id=CVE-2022-30522"},{"name":"CVE-2022-32742","url":"https://www.cve.org/CVERecord?id=CVE-2022-32742"},{"name":"CVE-2022-32745","url":"https://www.cve.org/CVERecord?id=CVE-2022-32745"},{"name":"CVE-2022-2031","url":"https://www.cve.org/CVERecord?id=CVE-2022-2031"},{"name":"CVE-2022-30556","url":"https://www.cve.org/CVERecord?id=CVE-2022-30556"},{"name":"CVE-2022-28615","url":"https://www.cve.org/CVERecord?id=CVE-2022-28615"},{"name":"CVE-2022-32744","url":"https://www.cve.org/CVERecord?id=CVE-2022-32744"},{"name":"CVE-2022-31813","url":"https://www.cve.org/CVERecord?id=CVE-2022-31813"},{"name":"CVE-2022-29404","url":"https://www.cve.org/CVERecord?id=CVE-2022-29404"},{"name":"CVE-2022-26377","url":"https://www.cve.org/CVERecord?id=CVE-2022-26377"},{"name":"CVE-2022-28330","url":"https://www.cve.org/CVERecord?id=CVE-2022-28330"},{"name":"CVE-2022-28614","url":"https://www.cve.org/CVERecord?id=CVE-2022-28614"}],"links":[],"reference":"CERTFR-2022-AVI-742","revisions":[{"description":"Version initiale","revision_date":"2022-08-16T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Qnap QTS. Certaines\nd'entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l'\u00e9diteur, un d\u00e9ni de service \u00e0 distance et\nune atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Qnap QTS","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-23 du 16 ao\u00fbt 2022","url":"https://www.qnap.com/fr-fr/security-advisory/qsa-22-23"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-22 du 16 ao\u00fbt 2022","url":"https://www.qnap.com/fr-fr/security-advisory/qsa-22-22"}]}
