{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Qnap Photo Station versions ant\u00e9rieures \u00e0 6.0.20 (2022/02/15)","product":{"name":"N/A","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap Photo Station versions ant\u00e9rieures \u00e0 5.4.13 (2022/02/11)","product":{"name":"N/A","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap Photo Station versions ant\u00e9rieures \u00e0 5.7.16 (2022/02/11)","product":{"name":"N/A","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap Video Station versions ant\u00e9rieures \u00e0 5.3.13","product":{"name":"Video Station","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap QTS versions ant\u00e9rieures \u00e0 4.5.4.1991 build 20220329","product":{"name":"QTS","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap QTS versions ant\u00e9rieures \u00e0 4.3.4.1976 build 20220303","product":{"name":"QTS","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap QuTScloud versions ant\u00e9rieures \u00e0 c5.0.1.1998","product":{"name":"N/A","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap QTS versions ant\u00e9rieures \u00e0 4.2.6 build 20220304","product":{"name":"QTS","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap QTS versions ant\u00e9rieures \u00e0 4.3.3.1945 build 20220303","product":{"name":"QTS","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap QTS versions ant\u00e9rieures \u00e0 5.0.0.1986 build 20220324","product":{"name":"QTS","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap Video Station versions ant\u00e9rieures \u00e0 5.5.9","product":{"name":"Video Station","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap QTS versions ant\u00e9rieures \u00e0 4.3.6.1965 build 20220302","product":{"name":"QTS","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap QVR versions ant\u00e9rieures \u00e0 5.1.6 build 20220401","product":{"name":"QVR","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap Video Station versions ant\u00e9rieures \u00e0 5.1.8","product":{"name":"Video Station","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap QuTS hero versions ant\u00e9rieures \u00e0 h5.0.0.1986 build 20220324","product":{"name":"QuTS hero","vendor":{"name":"Qnap","scada":false}}},{"description":"Qnap QuTS hero versions ant\u00e9rieures \u00e0 h4.5.4.1971 build 20220310","product":{"name":"QuTS hero","vendor":{"name":"Qnap","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-44056","url":"https://www.cve.org/CVERecord?id=CVE-2022-44056"},{"name":"CVE-2022-44057","url":"https://www.cve.org/CVERecord?id=CVE-2022-44057"},{"name":"CVE-2022-44053","url":"https://www.cve.org/CVERecord?id=CVE-2022-44053"},{"name":"CVE-2022-44052","url":"https://www.cve.org/CVERecord?id=CVE-2022-44052"},{"name":"CVE-2022-44054","url":"https://www.cve.org/CVERecord?id=CVE-2022-44054"},{"name":"CVE-2022-27588","url":"https://www.cve.org/CVERecord?id=CVE-2022-27588"},{"name":"CVE-2022-44055","url":"https://www.cve.org/CVERecord?id=CVE-2022-44055"},{"name":"CVE-2022-38693","url":"https://www.cve.org/CVERecord?id=CVE-2022-38693"},{"name":"CVE-2022-44051","url":"https://www.cve.org/CVERecord?id=CVE-2022-44051"}],"links":[],"reference":"CERTFR-2022-AVI-421","revisions":[{"description":"Version initiale","revision_date":"2022-05-06T00:00:00.000000"}],"risks":[{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap.\nCertaines d'entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l'\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-13 du 6 mai 2022","url":"https://www.qnap.com/fr-fr/security-advisory/qsa-22-13"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-14 du 6 mai 2022","url":"https://www.qnap.com/fr-fr/security-advisory/qsa-22-14"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-07 du 6 mai 2022","url":"https://www.qnap.com/fr-fr/security-advisory/qsa-22-07"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-15 du 6 mai 2022","url":"https://www.qnap.com/fr-fr/security-advisory/qsa-22-15"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Qnap qsa-22-16 du 6 mai 2022","url":"https://www.qnap.com/fr-fr/security-advisory/qsa-22-16"}]}
