Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-47562: CWE-77 in QNAP Systems Inc. Photo Station

0
High
VulnerabilityCVE-2023-47562cvecve-2023-47562cwe-77cwe-78
Published: Fri Feb 02 2024 (02/02/2024, 16:05:48 UTC)
Source: CVE
Vendor/Project: QNAP Systems Inc.
Product: Photo Station

Description

An OS command injection vulnerability has been reported to affect Photo Station. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following version: Photo Station 6.4.2 ( 2023/12/15 ) and later

AI-Powered Analysis

AILast updated: 07/05/2025, 09:28:10 UTC

Technical Analysis

CVE-2023-47562 is a high-severity OS command injection vulnerability affecting QNAP Systems Inc.'s Photo Station product, specifically versions 6.4.x prior to 6.4.2. The vulnerability is classified under CWE-77, which involves improper neutralization of special elements used in a command ('OS Command Injection'). This flaw allows an authenticated user to execute arbitrary operating system commands remotely over the network without requiring user interaction. The vulnerability arises from insufficient input validation or sanitization in the Photo Station application, enabling an attacker with valid credentials to inject malicious commands that the underlying OS executes. The vulnerability has a CVSS v3.1 base score of 7.4, reflecting its high severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), scope change (S:C), and partial impact on confidentiality, integrity, and availability (C:L/I:L/A:L). The vulnerability was publicly disclosed on February 2, 2024, and a patch was released on December 15, 2023, in version 6.4.2 of Photo Station. No known exploits are currently reported in the wild. The vulnerability's exploitation could allow attackers to execute arbitrary commands on the affected device, potentially leading to unauthorized data access, system compromise, or disruption of services hosted on the QNAP NAS device running Photo Station. Given that Photo Station is a multimedia management application commonly used on QNAP NAS devices, the vulnerability could be leveraged to pivot into broader network environments if exploited.

Potential Impact

For European organizations, the impact of CVE-2023-47562 could be significant, especially for those relying on QNAP NAS devices with Photo Station for media management, file sharing, or backup services. Successful exploitation could lead to unauthorized command execution, resulting in data breaches, loss of data integrity, or service outages. This could affect confidentiality of sensitive information stored on the NAS, integrity of files and configurations, and availability of services. Organizations in sectors such as media, education, SMBs, and enterprises using QNAP devices for collaborative workflows are at risk. Additionally, since the vulnerability requires authentication, insider threats or compromised credentials could facilitate exploitation. The scope change indicated by the CVSS vector suggests that exploitation could impact components beyond the initially vulnerable application, potentially affecting the entire NAS device and connected network segments. This could lead to lateral movement within corporate networks, increasing the risk of broader compromise. Furthermore, given the critical role of NAS devices in data storage and backup, disruption or compromise could have operational and compliance implications under European data protection regulations.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade QNAP Photo Station to version 6.4.2 or later, where the vulnerability is patched. Since the vulnerability requires authenticated access, organizations should enforce strong authentication mechanisms, including complex passwords and multi-factor authentication (MFA) where possible, to reduce the risk of credential compromise. Network segmentation should be applied to isolate NAS devices from general user networks and limit access to trusted users only. Monitoring and logging of authentication attempts and command execution on NAS devices should be enhanced to detect suspicious activities. Organizations should also review and restrict user privileges on Photo Station to the minimum necessary, reducing the risk posed by compromised accounts. Regular vulnerability scanning and penetration testing targeting NAS devices can help identify residual risks. Additionally, disabling or restricting remote access to Photo Station unless absolutely necessary can reduce the attack surface. Backup strategies should be reviewed to ensure data integrity and availability in case of compromise. Finally, organizations should stay informed about any emerging exploit reports and apply security advisories promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qnap
Date Reserved
2023-11-06T14:11:12.322Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8d53

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 9:28:10 AM

Last updated: 12/1/2025, 11:22:49 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats