Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62855: CWE-22 in QNAP Systems Inc. File Station 5

0
Low
VulnerabilityCVE-2025-62855cvecve-2025-62855cwe-22
Published: Wed Feb 11 2026 (02/11/2026, 12:16:00 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: File Station 5

Description

A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.5190 and later

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 15:04:40 UTC

Technical Analysis

CVE-2025-62855 is a path traversal vulnerability categorized under CWE-22 affecting QNAP Systems Inc.'s File Station 5 software, specifically versions 5.5.x prior to 5.5.6.5190. The vulnerability allows a local attacker who already possesses administrator-level access on the device to exploit the flaw to read files outside the intended directory boundaries. This is achieved by manipulating file path inputs to traverse directories and access arbitrary files on the system. The vulnerability does not require user interaction or network access, but it does require the attacker to have local administrative privileges, which limits the attack surface. The CVSS v4.0 score is 1.3, reflecting low severity due to the prerequisite of administrative access and limited impact confined to confidentiality (reading files). The vulnerability does not affect integrity or availability. No known exploits have been reported in the wild, and QNAP has addressed the issue in File Station 5 version 5.5.6.5190 and later. The flaw could potentially expose sensitive system files or configuration data, which might aid an attacker in further attacks or data exfiltration if combined with other vulnerabilities or insider threats. The vulnerability is relevant primarily to organizations using QNAP NAS devices with File Station 5, especially in environments where local administrative access controls may be weak or shared among multiple users.

Potential Impact

For European organizations, the impact of CVE-2025-62855 is generally low due to the requirement of local administrator privileges to exploit the vulnerability. However, in environments where multiple users have administrative access or where insider threats exist, this vulnerability could allow unauthorized reading of sensitive files, potentially exposing confidential data or system configuration information. This could facilitate further attacks or data breaches if combined with other vulnerabilities or social engineering. Organizations relying heavily on QNAP NAS devices for critical data storage or file sharing may face increased risk if the vulnerability is not patched. The exposure of system files could also impact compliance with data protection regulations such as GDPR if personal or sensitive data is accessed improperly. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach potential warrants attention, especially in sectors like finance, healthcare, and government where data sensitivity is high.

Mitigation Recommendations

European organizations should immediately verify the version of File Station 5 running on their QNAP NAS devices and upgrade to version 5.5.6.5190 or later, where the vulnerability is fixed. Restrict local administrator access strictly to trusted personnel and implement strong access control policies to minimize the risk of insider threats. Employ network segmentation to limit access to NAS devices and monitor administrative activities for suspicious behavior. Regularly audit file access logs and system configurations to detect unauthorized access attempts. Additionally, consider implementing endpoint security solutions that can detect abnormal file access patterns. Organizations should also ensure that their incident response plans include procedures for handling potential data exposure from such vulnerabilities. Finally, maintain up-to-date backups of critical data to mitigate the impact of any potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2025-10-24T02:43:49.269Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698c7a214b57a58fa195d0ee

Added to database: 2/11/2026, 12:46:25 PM

Last enriched: 2/18/2026, 3:04:40 PM

Last updated: 4/6/2026, 4:38:56 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses