CVE-2025-62855: CWE-22 in QNAP Systems Inc. File Station 5
A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.5190 and later
AI Analysis
Technical Summary
CVE-2025-62855 is a path traversal vulnerability categorized under CWE-22 affecting QNAP Systems Inc.'s File Station 5 software, specifically versions 5.5.x prior to 5.5.6.5190. The vulnerability allows a local attacker who already possesses administrator-level access on the device to exploit the flaw to read files outside the intended directory boundaries. This is achieved by manipulating file path inputs to traverse directories and access arbitrary files on the system. The vulnerability does not require user interaction or network access, but it does require the attacker to have local administrative privileges, which limits the attack surface. The CVSS v4.0 score is 1.3, reflecting low severity due to the prerequisite of administrative access and limited impact confined to confidentiality (reading files). The vulnerability does not affect integrity or availability. No known exploits have been reported in the wild, and QNAP has addressed the issue in File Station 5 version 5.5.6.5190 and later. The flaw could potentially expose sensitive system files or configuration data, which might aid an attacker in further attacks or data exfiltration if combined with other vulnerabilities or insider threats. The vulnerability is relevant primarily to organizations using QNAP NAS devices with File Station 5, especially in environments where local administrative access controls may be weak or shared among multiple users.
Potential Impact
For European organizations, the impact of CVE-2025-62855 is generally low due to the requirement of local administrator privileges to exploit the vulnerability. However, in environments where multiple users have administrative access or where insider threats exist, this vulnerability could allow unauthorized reading of sensitive files, potentially exposing confidential data or system configuration information. This could facilitate further attacks or data breaches if combined with other vulnerabilities or social engineering. Organizations relying heavily on QNAP NAS devices for critical data storage or file sharing may face increased risk if the vulnerability is not patched. The exposure of system files could also impact compliance with data protection regulations such as GDPR if personal or sensitive data is accessed improperly. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach potential warrants attention, especially in sectors like finance, healthcare, and government where data sensitivity is high.
Mitigation Recommendations
European organizations should immediately verify the version of File Station 5 running on their QNAP NAS devices and upgrade to version 5.5.6.5190 or later, where the vulnerability is fixed. Restrict local administrator access strictly to trusted personnel and implement strong access control policies to minimize the risk of insider threats. Employ network segmentation to limit access to NAS devices and monitor administrative activities for suspicious behavior. Regularly audit file access logs and system configurations to detect unauthorized access attempts. Additionally, consider implementing endpoint security solutions that can detect abnormal file access patterns. Organizations should also ensure that their incident response plans include procedures for handling potential data exposure from such vulnerabilities. Finally, maintain up-to-date backups of critical data to mitigate the impact of any potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-62855: CWE-22 in QNAP Systems Inc. File Station 5
Description
A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.5190 and later
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-62855 is a path traversal vulnerability categorized under CWE-22 affecting QNAP Systems Inc.'s File Station 5 software, specifically versions 5.5.x prior to 5.5.6.5190. The vulnerability allows a local attacker who already possesses administrator-level access on the device to exploit the flaw to read files outside the intended directory boundaries. This is achieved by manipulating file path inputs to traverse directories and access arbitrary files on the system. The vulnerability does not require user interaction or network access, but it does require the attacker to have local administrative privileges, which limits the attack surface. The CVSS v4.0 score is 1.3, reflecting low severity due to the prerequisite of administrative access and limited impact confined to confidentiality (reading files). The vulnerability does not affect integrity or availability. No known exploits have been reported in the wild, and QNAP has addressed the issue in File Station 5 version 5.5.6.5190 and later. The flaw could potentially expose sensitive system files or configuration data, which might aid an attacker in further attacks or data exfiltration if combined with other vulnerabilities or insider threats. The vulnerability is relevant primarily to organizations using QNAP NAS devices with File Station 5, especially in environments where local administrative access controls may be weak or shared among multiple users.
Potential Impact
For European organizations, the impact of CVE-2025-62855 is generally low due to the requirement of local administrator privileges to exploit the vulnerability. However, in environments where multiple users have administrative access or where insider threats exist, this vulnerability could allow unauthorized reading of sensitive files, potentially exposing confidential data or system configuration information. This could facilitate further attacks or data breaches if combined with other vulnerabilities or social engineering. Organizations relying heavily on QNAP NAS devices for critical data storage or file sharing may face increased risk if the vulnerability is not patched. The exposure of system files could also impact compliance with data protection regulations such as GDPR if personal or sensitive data is accessed improperly. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach potential warrants attention, especially in sectors like finance, healthcare, and government where data sensitivity is high.
Mitigation Recommendations
European organizations should immediately verify the version of File Station 5 running on their QNAP NAS devices and upgrade to version 5.5.6.5190 or later, where the vulnerability is fixed. Restrict local administrator access strictly to trusted personnel and implement strong access control policies to minimize the risk of insider threats. Employ network segmentation to limit access to NAS devices and monitor administrative activities for suspicious behavior. Regularly audit file access logs and system configurations to detect unauthorized access attempts. Additionally, consider implementing endpoint security solutions that can detect abnormal file access patterns. Organizations should also ensure that their incident response plans include procedures for handling potential data exposure from such vulnerabilities. Finally, maintain up-to-date backups of critical data to mitigate the impact of any potential exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qnap
- Date Reserved
- 2025-10-24T02:43:49.269Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698c7a214b57a58fa195d0ee
Added to database: 2/11/2026, 12:46:25 PM
Last enriched: 2/18/2026, 3:04:40 PM
Last updated: 4/6/2026, 4:38:56 AM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.