Skip to main content

CVE-2025-29872: CWE-770 in QNAP Systems Inc. File Station 5

High
VulnerabilityCVE-2025-29872cvecve-2025-29872cwe-770
Published: Fri Jun 06 2025 (06/06/2025, 15:52:45 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: File Station 5

Description

An allocation of resources without limits or throttling vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4847 and later

AI-Powered Analysis

AILast updated: 07/08/2025, 04:25:52 UTC

Technical Analysis

CVE-2025-29872 is a high-severity vulnerability affecting QNAP Systems Inc.'s File Station 5, specifically version 5.5.x. The vulnerability is categorized under CWE-770, which involves allocation of resources without limits or throttling. This flaw allows a remote attacker who has already obtained a user account on the affected system to exploit the vulnerability by consuming or locking resources excessively. This can lead to a denial of service (DoS) condition where other systems, applications, or processes are prevented from accessing the same type of resource, effectively disrupting normal operations. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity and no additional privileges beyond a valid user account. The CVSS 4.0 base score is 7.1, reflecting its high severity due to the significant impact on availability and the ease of exploitation. The vendor has addressed this issue in File Station 5 version 5.5.6.4847 and later. No known exploits are currently reported in the wild, but the presence of a fix indicates the vulnerability is recognized and should be remediated promptly. The vulnerability's impact is primarily on availability, as it can cause resource exhaustion and denial of service, but it does not affect confidentiality or integrity directly.

Potential Impact

For European organizations using QNAP NAS devices with File Station 5 version 5.5.x, this vulnerability poses a significant risk to service availability. Organizations relying on QNAP NAS for file sharing, backup, or collaboration could experience disruptions if an attacker with a user account exploits this flaw to exhaust resources. This could lead to downtime, loss of productivity, and potential operational delays. Critical sectors such as finance, healthcare, government, and manufacturing that depend on continuous access to file storage and sharing services could be particularly impacted. Additionally, since the vulnerability requires only a user account, insider threats or compromised credentials could be leveraged to launch attacks, increasing the risk profile. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure. The disruption of availability could also affect compliance with data availability requirements under regulations like GDPR, potentially leading to legal and reputational consequences.

Mitigation Recommendations

European organizations should immediately verify the version of File Station 5 running on their QNAP NAS devices and upgrade to version 5.5.6.4847 or later where the vulnerability is patched. Beyond patching, organizations should enforce strict user account management policies, including strong authentication mechanisms, regular credential audits, and monitoring for unusual resource consumption patterns indicative of exploitation attempts. Implementing network segmentation to limit access to NAS management interfaces and applying least privilege principles to user accounts can reduce the attack surface. Additionally, deploying resource usage monitoring and alerting on NAS devices can help detect early signs of resource exhaustion attacks. Organizations should also consider integrating QNAP devices into their broader security information and event management (SIEM) systems for centralized monitoring. Regular backups and incident response plans should be updated to address potential denial of service scenarios. Finally, educating users about credential security and monitoring for compromised accounts will further reduce exploitation risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qnap
Date Reserved
2025-03-12T08:06:37.742Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6843110671f4d251b5d0a5e1

Added to database: 6/6/2025, 4:02:14 PM

Last enriched: 7/8/2025, 4:25:52 AM

Last updated: 8/3/2025, 2:27:13 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats