Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47208: CWE-770 in QNAP Systems Inc. QTS

0
Medium
VulnerabilityCVE-2025-47208cvecve-2025-47208cwe-770
Published: Fri Jan 02 2026 (01/02/2026, 14:52:49 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: QTS

Description

An allocation of resources without limits or throttling vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later

AI-Powered Analysis

AILast updated: 01/02/2026, 15:18:15 UTC

Technical Analysis

CVE-2025-47208 is a resource allocation vulnerability categorized under CWE-770, affecting QNAP Systems Inc.'s QTS operating system, specifically version 5.2.x. The flaw arises because the system allocates resources without imposing limits or throttling, allowing a remote attacker who has obtained a user account to consume excessive shared resources. This resource exhaustion can prevent other legitimate systems, applications, or processes from accessing the same resource type, effectively causing a denial of service (DoS) condition. The vulnerability does not require user interaction and can be exploited remotely over the network with low privileges, increasing its risk profile. The CVSS 4.0 base score is 4.9 (medium severity), reflecting network attack vector, low attack complexity, no user interaction, and high impact on availability. QNAP addressed this vulnerability in QTS 5.2.6.3195 build 20250715 and later, as well as in QuTS hero h5.2.6.3195 build 20250715 and later. No public exploits or active exploitation have been reported to date. The vulnerability primarily threatens availability by enabling denial of service through resource exhaustion, which can disrupt business operations relying on QNAP NAS devices for storage and network services.

Potential Impact

For European organizations, the impact of CVE-2025-47208 can be significant, especially for those relying heavily on QNAP NAS devices for critical data storage, backup, and file sharing services. Exploitation could lead to denial of service conditions, interrupting access to essential data and applications hosted on or dependent on these devices. This disruption can affect business continuity, data availability, and operational efficiency. Sectors such as finance, healthcare, manufacturing, and public administration, which often use NAS devices for centralized storage, could face operational delays and potential compliance issues if data access is interrupted. Additionally, organizations with remote or hybrid workforces that depend on network-attached storage for collaboration may experience productivity losses. While confidentiality and integrity impacts are not directly indicated, the availability impact alone can cause cascading effects in IT environments. The requirement for a user account to exploit the vulnerability underscores the importance of strong identity and access management to reduce risk.

Mitigation Recommendations

1. Immediately update all QNAP QTS devices to version 5.2.6.3195 build 20250715 or later, or QuTS hero h5.2.6.3195 build 20250715 or later, to apply the official patch addressing this vulnerability. 2. Enforce strict user account management policies: disable or remove unused accounts, enforce strong password policies, and implement multi-factor authentication (MFA) where supported to reduce the risk of account compromise. 3. Limit network exposure of QNAP devices by restricting access to trusted networks and using VPNs for remote connections to minimize attack surface. 4. Monitor resource usage on QNAP devices for abnormal spikes that may indicate exploitation attempts, and configure alerts for unusual activity. 5. Implement network segmentation to isolate NAS devices from critical infrastructure where possible, reducing potential impact scope. 6. Regularly audit device logs and user activity to detect suspicious behavior early. 7. Educate users about phishing and credential security to prevent attackers from obtaining valid user accounts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2025-05-02T05:58:18.475Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6957dd46db813ff03ef06669

Added to database: 1/2/2026, 2:59:18 PM

Last enriched: 1/2/2026, 3:18:15 PM

Last updated: 1/8/2026, 7:23:58 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats