Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59385: CWE-290 in QNAP Systems Inc. QTS

0
High
VulnerabilityCVE-2025-59385cvecve-2025-59385cwe-290
Published: Tue Dec 16 2025 (12/16/2025, 02:25:16 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: QTS

Description

An authentication bypass by spoofing vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to access resources which are not otherwise accessible without proper authentication. We have already fixed the vulnerability in the following versions: QTS 5.2.7.3297 build 20251024 and later QuTS hero h5.2.7.3297 build 20251024 and later QuTS hero h5.3.1.3292 build 20251024 and later

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:46:44 UTC

Technical Analysis

CVE-2025-59385 is an authentication bypass vulnerability categorized under CWE-290, discovered in QNAP Systems Inc.'s QTS operating system, specifically affecting version 5.2.x. The vulnerability allows remote attackers to spoof authentication mechanisms, bypassing normal access controls without requiring any privileges or user interaction. This means an attacker can remotely access resources that should be protected by authentication, potentially leading to unauthorized data access, modification, or device control. The CVSS 4.0 base score is 8.1, reflecting high severity due to network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed on December 16, 2025, with patches released in QTS 5.2.7.3297 build 20251024 and later, including QuTS hero variants. Although no active exploits have been reported, the vulnerability's nature makes it a critical risk for NAS devices running affected QTS versions. Attackers exploiting this flaw could gain unauthorized access to sensitive files, configuration settings, and potentially use the compromised device as a foothold for lateral movement within enterprise networks.

Potential Impact

The impact of CVE-2025-59385 is significant for organizations relying on QNAP NAS devices running vulnerable QTS versions. Unauthorized access to NAS resources can lead to data breaches, exposure of sensitive or proprietary information, and disruption of business operations. Attackers could manipulate or delete critical files, compromise backups, or deploy malware such as ransomware. Given the NAS's role as centralized storage, compromise can affect multiple users and systems within an organization. The vulnerability's ease of exploitation and lack of required authentication increase the risk of widespread attacks. Enterprises, SMBs, and even home users depending on QNAP devices are at risk, with potential regulatory and reputational consequences for organizations suffering data loss or exposure.

Mitigation Recommendations

Organizations should immediately verify their QNAP QTS version and upgrade to the patched versions: QTS 5.2.7.3297 build 20251024 or later, or the corresponding QuTS hero versions. If immediate patching is not feasible, restrict network access to the NAS management interfaces by implementing firewall rules that limit access to trusted IP addresses only. Disable any unnecessary remote management features and enforce strong network segmentation to isolate NAS devices from untrusted networks. Monitor network traffic and device logs for unusual authentication attempts or access patterns indicative of exploitation attempts. Additionally, implement regular backups stored offline or on separate systems to mitigate data loss risks. Stay informed on QNAP security advisories for any updates or additional mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2025-09-15T08:35:00.660Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6940c7c9d9bcdf3f3d1a9816

Added to database: 12/16/2025, 2:45:29 AM

Last enriched: 2/27/2026, 6:46:44 AM

Last updated: 3/24/2026, 7:16:53 AM

Views: 238

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses