EUVD-2025-17332

| CVE-2025-30279 HIGH
2025-06-06 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17332
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
CVE Published
Jun 06, 2025 - 16:15 nvd
HIGH 8.8

Description

An improper certificate validation vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to compromise the security of the system. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4847 and later

Analysis

CVE-2025-30279 is an improper certificate validation vulnerability in QNAP File Station 5 that allows authenticated remote attackers to compromise system confidentiality, integrity, and availability. Affected versions are below 5.5.6.4847; the vulnerability requires valid user credentials but no user interaction, making it a significant post-authentication attack vector with a CVSS score of 8.8 indicating high severity.

Technical Context

This vulnerability stems from improper X.509 certificate validation (CWE-295), a critical flaw in SSL/TLS certificate verification mechanisms. File Station 5, a file management service on QNAP NAS systems, fails to properly validate certificates during secure communications, potentially allowing man-in-the-middle (MITM) attacks or bypass of authentication controls. The root cause involves inadequate implementation of certificate chain validation, hostname verification, or certificate pinning mechanisms. An authenticated attacker can exploit this to intercept, modify, or forge secure communications, leading to complete system compromise including unauthorized data access, modification, and service disruption.

Affected Products

QNAP File Station 5 versions below 5.5.6.4847 are affected. Specific CPE: cpe:2.3:a:qnap:file_station_5:*:*:*:*:*:*:*:* (versions < 5.5.6.4847). File Station 5 is a core component of QNAP NAS systems running applicable firmware versions. Affected installations include any QNAP NAS device with File Station 5 enabled and running vulnerable versions. The vendor advisory indicates the fix is available in File Station 5 version 5.5.6.4847 and all subsequent releases.

Remediation

Immediate remediation requires upgrading File Station 5 to version 5.5.6.4847 or later. Organizations should: (1) Apply the vendor patch immediately to all affected QNAP NAS systems; (2) Verify patch deployment through QNAP management interfaces; (3) Review user account access logs for suspicious activities during the vulnerability window; (4) Implement network segmentation to restrict File Station access to trusted networks; (5) Monitor certificate validation errors in system logs; (6) Consider temporary service restrictions until patching is complete. No workarounds are documented; patching is the primary mitigation path. Refer to QNAP's official security advisory for detailed patch deployment procedures and rollback guidance.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: 0

Share

EUVD-2025-17332 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy