CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Description
A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4847 and later
Analysis
NULL pointer dereference vulnerability in QNAP File Station 5 that allows authenticated remote attackers to trigger a denial-of-service condition by causing the application to crash. While the CVSS 7.5 score reflects the severity of availability impact, the vulnerability requires valid user credentials to exploit, making it primarily a risk for organizations with compromised or malicious insider accounts. The vendor has released patches in version 5.5.6.4847 and later.
Technical Context
The vulnerability resides in QNAP File Station 5 (CPE: cpe:2.3:a:qnap:file_station:5:*:*:*:*:*:*:*), a file management application commonly deployed on QNAP NAS devices. The root cause is classified under CWE-476 (NULL Pointer Dereference), which occurs when the application attempts to dereference a pointer that has not been properly initialized or validated before use. This type of memory safety flaw typically results from insufficient input validation or error handling during file operations or session management within File Station's backend services. The NULL pointer dereference likely occurs in a code path that processes authenticated user requests, possibly related to file operations, metadata handling, or session state management.
Affected Products
File Station 5 (versions prior to 5.5.6.4847)
Remediation
- action: Immediate Patch; description: Upgrade File Station 5 to version 5.5.6.4847 or later. Apply patches through QNAP's official security advisories and firmware update mechanisms. - action: Access Control; description: Implement strict authentication controls and restrict File Station 5 access to trusted users only. Enforce strong passwords and multi-factor authentication (MFA) if supported by the NAS platform. - action: Network Segmentation; description: Isolate File Station 5 and underlying NAS devices on protected network segments with restricted access from untrusted networks. Use firewall rules to limit administrative access. - action: Monitoring; description: Monitor File Station 5 service logs for unexpected crashes or DoS patterns. Implement alerting for service restarts or availability anomalies. - action: Audit User Accounts; description: Conduct an audit of all File Station 5 user accounts and remove or disable unnecessary accounts, particularly those with elevated privileges.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17333