CVE-2025-47208: CWE-770 in QNAP Systems Inc. QTS
An allocation of resources without limits or throttling vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
AI Analysis
Technical Summary
CVE-2025-47208 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without proper limits or throttling. This flaw affects QNAP Systems Inc.'s QTS operating system, specifically versions 5.2.x. The vulnerability allows a remote attacker who has obtained a valid user account on the system to exploit the lack of resource allocation controls. By doing so, the attacker can consume or exhaust shared resources such as memory, CPU cycles, or other system resources, thereby preventing other legitimate systems, applications, or processes from accessing these resources. This can lead to denial of service conditions, impacting the availability of the affected NAS device and potentially disrupting services relying on it. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and does not require user interaction (UI:N). Privileges required are low (PR:L), meaning any authenticated user can exploit this issue without needing administrative rights. The vulnerability does not affect confidentiality or integrity but has a high impact on availability (VA:H). The vendor has addressed the issue in QTS and QuTS hero versions 5.2.6.3195 build 20250715 and later. No known exploits have been reported in the wild, indicating limited active exploitation at this time. However, the presence of the vulnerability in widely deployed QNAP NAS devices poses a risk for denial of service attacks if exploited.
Potential Impact
For European organizations, the primary impact of CVE-2025-47208 is on the availability of network-attached storage (NAS) systems running vulnerable QNAP QTS versions. Many enterprises, SMBs, and critical infrastructure entities in Europe rely on QNAP NAS devices for data storage, backup, and file sharing. Exploitation could lead to denial of service, disrupting business operations, data access, and potentially impacting services dependent on these devices. This could affect sectors such as finance, healthcare, manufacturing, and government agencies where data availability is critical. Additionally, denial of service conditions might cascade if NAS devices are part of larger IT infrastructure or backup systems. Although confidentiality and integrity are not directly impacted, operational disruptions could lead to indirect consequences such as delayed incident response or recovery. The medium CVSS score reflects moderate risk, but the ease of exploitation by any authenticated user elevates the threat in environments with weak access controls or compromised credentials.
Mitigation Recommendations
European organizations should immediately verify the QTS version running on their QNAP NAS devices and upgrade to version 5.2.6.3195 build 20250715 or later for both QTS and QuTS hero platforms. Implement strict access controls to limit user account creation and enforce strong authentication mechanisms to reduce the risk of unauthorized access. Monitor resource usage metrics on NAS devices to detect abnormal consumption patterns indicative of exploitation attempts. Employ network segmentation to isolate NAS devices from less trusted network zones, minimizing exposure. Regularly audit user accounts and remove or disable inactive or unnecessary accounts to reduce the attack surface. Consider deploying intrusion detection systems capable of identifying unusual resource exhaustion behaviors. Maintain up-to-date backups and test recovery procedures to mitigate potential operational impacts from denial of service conditions. Finally, stay informed on vendor advisories and security updates related to QNAP products.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain, Poland, Sweden
CVE-2025-47208: CWE-770 in QNAP Systems Inc. QTS
Description
An allocation of resources without limits or throttling vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
AI-Powered Analysis
Technical Analysis
CVE-2025-47208 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without proper limits or throttling. This flaw affects QNAP Systems Inc.'s QTS operating system, specifically versions 5.2.x. The vulnerability allows a remote attacker who has obtained a valid user account on the system to exploit the lack of resource allocation controls. By doing so, the attacker can consume or exhaust shared resources such as memory, CPU cycles, or other system resources, thereby preventing other legitimate systems, applications, or processes from accessing these resources. This can lead to denial of service conditions, impacting the availability of the affected NAS device and potentially disrupting services relying on it. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and does not require user interaction (UI:N). Privileges required are low (PR:L), meaning any authenticated user can exploit this issue without needing administrative rights. The vulnerability does not affect confidentiality or integrity but has a high impact on availability (VA:H). The vendor has addressed the issue in QTS and QuTS hero versions 5.2.6.3195 build 20250715 and later. No known exploits have been reported in the wild, indicating limited active exploitation at this time. However, the presence of the vulnerability in widely deployed QNAP NAS devices poses a risk for denial of service attacks if exploited.
Potential Impact
For European organizations, the primary impact of CVE-2025-47208 is on the availability of network-attached storage (NAS) systems running vulnerable QNAP QTS versions. Many enterprises, SMBs, and critical infrastructure entities in Europe rely on QNAP NAS devices for data storage, backup, and file sharing. Exploitation could lead to denial of service, disrupting business operations, data access, and potentially impacting services dependent on these devices. This could affect sectors such as finance, healthcare, manufacturing, and government agencies where data availability is critical. Additionally, denial of service conditions might cascade if NAS devices are part of larger IT infrastructure or backup systems. Although confidentiality and integrity are not directly impacted, operational disruptions could lead to indirect consequences such as delayed incident response or recovery. The medium CVSS score reflects moderate risk, but the ease of exploitation by any authenticated user elevates the threat in environments with weak access controls or compromised credentials.
Mitigation Recommendations
European organizations should immediately verify the QTS version running on their QNAP NAS devices and upgrade to version 5.2.6.3195 build 20250715 or later for both QTS and QuTS hero platforms. Implement strict access controls to limit user account creation and enforce strong authentication mechanisms to reduce the risk of unauthorized access. Monitor resource usage metrics on NAS devices to detect abnormal consumption patterns indicative of exploitation attempts. Employ network segmentation to isolate NAS devices from less trusted network zones, minimizing exposure. Regularly audit user accounts and remove or disable inactive or unnecessary accounts to reduce the attack surface. Consider deploying intrusion detection systems capable of identifying unusual resource exhaustion behaviors. Maintain up-to-date backups and test recovery procedures to mitigate potential operational impacts from denial of service conditions. Finally, stay informed on vendor advisories and security updates related to QNAP products.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qnap
- Date Reserved
- 2025-05-02T05:58:18.475Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6957dd46db813ff03ef06669
Added to database: 1/2/2026, 2:59:18 PM
Last enriched: 1/9/2026, 5:15:08 PM
Last updated: 2/7/2026, 11:42:25 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.