Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9110: CWE-497 in QNAP Systems Inc. QTS

0
Low
VulnerabilityCVE-2025-9110cvecve-2025-9110cwe-497
Published: Fri Jan 02 2026 (01/02/2026, 15:17:29 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: QTS

Description

An exposure of sensitive system information to an unauthorized control sphere vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to read application data. We have already fixed the vulnerability in the following versions: QTS 5.2.8.3332 build 20251128 and later QuTS hero h5.2.8.3321 build 20251117 and later QuTS hero h5.3.1.3250 build 20250912 and later

AI-Powered Analysis

AILast updated: 01/09/2026, 17:20:26 UTC

Technical Analysis

CVE-2025-9110 is a vulnerability identified in QNAP Systems Inc.'s QTS operating system, specifically affecting version 5.2.x and related QuTS hero versions. The vulnerability is classified under CWE-497, which involves the exposure of sensitive system information to unauthorized actors. This flaw allows remote attackers to access application data without requiring any authentication, user interaction, or privileges, making it remotely exploitable over the network. The vulnerability does not impact system integrity or availability but compromises confidentiality by enabling unauthorized reading of application data. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U) indicates network attack vector, low complexity, no authentication or user interaction, and low confidentiality impact. The vendor has addressed this issue in QTS 5.2.8.3332 build 20251128 and later, as well as in QuTS hero h5.2.8.3321 build 20251117 and h5.3.1.3250 build 20250912 and later. No public exploits have been reported, and the vulnerability was reserved in August 2025 and published in January 2026. The exposure of sensitive information could aid attackers in further reconnaissance or targeted attacks if left unpatched.

Potential Impact

For European organizations, the primary impact of CVE-2025-9110 is the potential unauthorized disclosure of sensitive application data stored or processed on vulnerable QNAP NAS devices. This could lead to confidentiality breaches, especially if the exposed data includes business-critical or personal information protected under regulations like GDPR. While the vulnerability does not allow system control or data modification, the information leakage could facilitate subsequent attacks such as phishing, social engineering, or targeted exploitation of other vulnerabilities. Organizations relying heavily on QNAP NAS for data storage, backup, or file sharing may face increased risk exposure. Given the low CVSS score and lack of known exploits, the immediate risk is limited, but the widespread use of QNAP devices in European SMEs and enterprises means the attack surface is significant. Additionally, sectors with stringent data protection requirements, such as finance, healthcare, and government, could be more sensitive to such information disclosures.

Mitigation Recommendations

To mitigate CVE-2025-9110, European organizations should promptly update all affected QNAP QTS and QuTS hero devices to the patched versions: QTS 5.2.8.3332 build 20251128 or later, QuTS hero h5.2.8.3321 build 20251117 or later, and QuTS hero h5.3.1.3250 build 20250912 or later. Network segmentation should be employed to isolate NAS devices from untrusted networks, reducing exposure to remote attacks. Implement strict access controls and monitor network traffic for unusual activity targeting NAS devices. Disable unnecessary services and interfaces on QNAP devices to minimize attack vectors. Regularly audit device configurations and logs for signs of unauthorized access or data exfiltration attempts. Additionally, organizations should maintain an inventory of QNAP devices to ensure all are identified and updated. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for QNAP-related exploits can provide early warnings. Finally, ensure backups are securely maintained to prevent data loss in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2025-08-18T08:29:16.532Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6957e42ddb813ff03ef241dd

Added to database: 1/2/2026, 3:28:45 PM

Last enriched: 1/9/2026, 5:20:26 PM

Last updated: 2/7/2026, 3:55:01 AM

Views: 146

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats