Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47208: CWE-770 in QNAP Systems Inc. QTS

0
Medium
VulnerabilityCVE-2025-47208cvecve-2025-47208cwe-770
Published: Fri Jan 02 2026 (01/02/2026, 14:52:49 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: QTS

Description

An allocation of resources without limits or throttling vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later

AI-Powered Analysis

AILast updated: 01/09/2026, 17:15:08 UTC

Technical Analysis

CVE-2025-47208 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without proper limits or throttling. This flaw affects QNAP Systems Inc.'s QTS operating system, specifically versions 5.2.x. The vulnerability allows a remote attacker who has obtained a valid user account on the system to exploit the lack of resource allocation controls. By doing so, the attacker can consume or exhaust shared resources such as memory, CPU cycles, or other system resources, thereby preventing other legitimate systems, applications, or processes from accessing these resources. This can lead to denial of service conditions, impacting the availability of the affected NAS device and potentially disrupting services relying on it. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and does not require user interaction (UI:N). Privileges required are low (PR:L), meaning any authenticated user can exploit this issue without needing administrative rights. The vulnerability does not affect confidentiality or integrity but has a high impact on availability (VA:H). The vendor has addressed the issue in QTS and QuTS hero versions 5.2.6.3195 build 20250715 and later. No known exploits have been reported in the wild, indicating limited active exploitation at this time. However, the presence of the vulnerability in widely deployed QNAP NAS devices poses a risk for denial of service attacks if exploited.

Potential Impact

For European organizations, the primary impact of CVE-2025-47208 is on the availability of network-attached storage (NAS) systems running vulnerable QNAP QTS versions. Many enterprises, SMBs, and critical infrastructure entities in Europe rely on QNAP NAS devices for data storage, backup, and file sharing. Exploitation could lead to denial of service, disrupting business operations, data access, and potentially impacting services dependent on these devices. This could affect sectors such as finance, healthcare, manufacturing, and government agencies where data availability is critical. Additionally, denial of service conditions might cascade if NAS devices are part of larger IT infrastructure or backup systems. Although confidentiality and integrity are not directly impacted, operational disruptions could lead to indirect consequences such as delayed incident response or recovery. The medium CVSS score reflects moderate risk, but the ease of exploitation by any authenticated user elevates the threat in environments with weak access controls or compromised credentials.

Mitigation Recommendations

European organizations should immediately verify the QTS version running on their QNAP NAS devices and upgrade to version 5.2.6.3195 build 20250715 or later for both QTS and QuTS hero platforms. Implement strict access controls to limit user account creation and enforce strong authentication mechanisms to reduce the risk of unauthorized access. Monitor resource usage metrics on NAS devices to detect abnormal consumption patterns indicative of exploitation attempts. Employ network segmentation to isolate NAS devices from less trusted network zones, minimizing exposure. Regularly audit user accounts and remove or disable inactive or unnecessary accounts to reduce the attack surface. Consider deploying intrusion detection systems capable of identifying unusual resource exhaustion behaviors. Maintain up-to-date backups and test recovery procedures to mitigate potential operational impacts from denial of service conditions. Finally, stay informed on vendor advisories and security updates related to QNAP products.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2025-05-02T05:58:18.475Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6957dd46db813ff03ef06669

Added to database: 1/2/2026, 2:59:18 PM

Last enriched: 1/9/2026, 5:15:08 PM

Last updated: 2/7/2026, 11:42:25 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats