Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62855: CWE-22 in QNAP Systems Inc. File Station 5

0
Low
VulnerabilityCVE-2025-62855cvecve-2025-62855cwe-22
Published: Wed Feb 11 2026 (02/11/2026, 12:16:00 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: File Station 5

Description

CVE-2025-62855 is a path traversal vulnerability in QNAP Systems Inc. 's File Station 5, specifically affecting version 5. 5. x. A local attacker with administrator privileges can exploit this flaw to read arbitrary files outside the intended directory scope, potentially exposing sensitive system data. The vulnerability has a low CVSS score of 1. 3, indicating limited impact and ease of exploitation. No user interaction or network access is required, but administrative privileges are necessary. The issue has been fixed in File Station 5 version 5. 5.

AI-Powered Analysis

AILast updated: 02/18/2026, 15:04:40 UTC

Technical Analysis

CVE-2025-62855 is a path traversal vulnerability categorized under CWE-22 affecting QNAP Systems Inc.'s File Station 5 software, specifically versions 5.5.x prior to 5.5.6.5190. The vulnerability allows a local attacker who already possesses administrator-level access on the device to exploit the flaw to read files outside the intended directory boundaries. This is achieved by manipulating file path inputs to traverse directories and access arbitrary files on the system. The vulnerability does not require user interaction or network access, but it does require the attacker to have local administrative privileges, which limits the attack surface. The CVSS v4.0 score is 1.3, reflecting low severity due to the prerequisite of administrative access and limited impact confined to confidentiality (reading files). The vulnerability does not affect integrity or availability. No known exploits have been reported in the wild, and QNAP has addressed the issue in File Station 5 version 5.5.6.5190 and later. The flaw could potentially expose sensitive system files or configuration data, which might aid an attacker in further attacks or data exfiltration if combined with other vulnerabilities or insider threats. The vulnerability is relevant primarily to organizations using QNAP NAS devices with File Station 5, especially in environments where local administrative access controls may be weak or shared among multiple users.

Potential Impact

For European organizations, the impact of CVE-2025-62855 is generally low due to the requirement of local administrator privileges to exploit the vulnerability. However, in environments where multiple users have administrative access or where insider threats exist, this vulnerability could allow unauthorized reading of sensitive files, potentially exposing confidential data or system configuration information. This could facilitate further attacks or data breaches if combined with other vulnerabilities or social engineering. Organizations relying heavily on QNAP NAS devices for critical data storage or file sharing may face increased risk if the vulnerability is not patched. The exposure of system files could also impact compliance with data protection regulations such as GDPR if personal or sensitive data is accessed improperly. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach potential warrants attention, especially in sectors like finance, healthcare, and government where data sensitivity is high.

Mitigation Recommendations

European organizations should immediately verify the version of File Station 5 running on their QNAP NAS devices and upgrade to version 5.5.6.5190 or later, where the vulnerability is fixed. Restrict local administrator access strictly to trusted personnel and implement strong access control policies to minimize the risk of insider threats. Employ network segmentation to limit access to NAS devices and monitor administrative activities for suspicious behavior. Regularly audit file access logs and system configurations to detect unauthorized access attempts. Additionally, consider implementing endpoint security solutions that can detect abnormal file access patterns. Organizations should also ensure that their incident response plans include procedures for handling potential data exposure from such vulnerabilities. Finally, maintain up-to-date backups of critical data to mitigate the impact of any potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2025-10-24T02:43:49.269Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698c7a214b57a58fa195d0ee

Added to database: 2/11/2026, 12:46:25 PM

Last enriched: 2/18/2026, 3:04:40 PM

Last updated: 2/20/2026, 10:08:08 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats