Skip to main content

CVE-2025-29890: CWE-770 in QNAP Systems Inc. File Station 5

High
VulnerabilityCVE-2025-29890cvecve-2025-29890cwe-770
Published: Fri Aug 29 2025 (08/29/2025, 17:14:52 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: File Station 5

Description

An allocation of resources without limits or throttling vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4907 and later

AI-Powered Analysis

AILast updated: 08/29/2025, 18:03:44 UTC

Technical Analysis

CVE-2025-29890 is a high-severity vulnerability classified under CWE-770, which pertains to the allocation of resources without limits or throttling. This vulnerability affects QNAP Systems Inc.'s File Station 5, specifically versions 5.5.x prior to 5.5.6.4907. The flaw allows a remote attacker who has already obtained a user account on the affected system to exploit the resource allocation mechanism. By doing so, the attacker can exhaust or monopolize certain system resources, thereby preventing other systems, applications, or processes from accessing the same type of resource. This can lead to denial of service conditions impacting availability. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity and no additional privileges beyond a valid user account. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, privileges required (user-level), no user interaction, no impact on confidentiality or integrity, but high impact on availability, and no scope or security requirement changes. The vendor has addressed this vulnerability in File Station 5 version 5.5.6.4907 and later. No known exploits are currently reported in the wild, but the potential for denial of service makes this a significant concern for affected deployments.

Potential Impact

For European organizations using QNAP File Station 5, this vulnerability poses a significant risk to service availability. File Station is commonly used for file management and sharing on QNAP NAS devices, which are widely deployed in enterprise, SMB, and even home office environments across Europe. An attacker with a valid user account could exploit this vulnerability to cause denial of service, disrupting business operations, data access, and collaboration. This could affect critical workflows, especially in sectors relying on continuous file availability such as finance, healthcare, education, and government. The lack of impact on confidentiality and integrity limits the risk of data breaches or tampering, but the availability impact alone can cause operational downtime and potential financial losses. Additionally, since exploitation requires a valid user account, organizations with weak user access controls or compromised credentials are at higher risk. The absence of known exploits in the wild suggests limited immediate threat, but the high CVSS score and ease of exploitation warrant prompt remediation to prevent future attacks.

Mitigation Recommendations

1. Immediate upgrade to File Station 5 version 5.5.6.4907 or later to apply the vendor's patch addressing this vulnerability. 2. Enforce strict user account management policies, including strong password requirements, multi-factor authentication (MFA), and regular credential audits to reduce the risk of account compromise. 3. Monitor system resource usage on QNAP NAS devices to detect abnormal consumption patterns indicative of exploitation attempts. 4. Implement network segmentation and access controls to limit exposure of QNAP NAS devices to only trusted users and networks. 5. Regularly review and restrict user permissions to the minimum necessary, reducing the number of accounts that could exploit this vulnerability. 6. Employ logging and alerting mechanisms to detect unusual activity related to File Station resource usage. 7. Educate users about the risks of credential compromise and phishing attacks that could lead to account takeover. These steps go beyond generic advice by focusing on both patching and operational controls tailored to the nature of this vulnerability and the affected product.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qnap
Date Reserved
2025-03-12T08:12:28.508Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b1e443ad5a09ad0079b79c

Added to database: 8/29/2025, 5:32:51 PM

Last enriched: 8/29/2025, 6:03:44 PM

Last updated: 9/4/2025, 12:34:41 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats