Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9110: CWE-497 in QNAP Systems Inc. QTS

0
Low
VulnerabilityCVE-2025-9110cvecve-2025-9110cwe-497
Published: Fri Jan 02 2026 (01/02/2026, 15:17:29 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: QTS

Description

An exposure of sensitive system information to an unauthorized control sphere vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to read application data. We have already fixed the vulnerability in the following versions: QTS 5.2.8.3332 build 20251128 and later QuTS hero h5.2.8.3321 build 20251117 and later QuTS hero h5.3.1.3250 build 20250912 and later

AI-Powered Analysis

AILast updated: 01/02/2026, 15:44:36 UTC

Technical Analysis

CVE-2025-9110 is a vulnerability identified in QNAP Systems Inc.'s QTS operating system, specifically affecting version 5.2.x and related QuTS hero versions prior to the patched builds. The vulnerability is classified under CWE-497, which involves the exposure of sensitive system information to unauthorized actors. This flaw allows remote attackers to access sensitive application data without requiring authentication, user interaction, or privileges, exploiting a weakness in how the system controls information disclosure. The vulnerability does not affect system integrity or availability directly but could provide attackers with valuable information that may facilitate further attacks or reconnaissance. The CVSS 4.0 vector indicates the attack can be performed remotely over the network with low complexity and no privileges or user interaction needed, but the impact on confidentiality is limited (VC:L), with no impact on integrity or availability. The vendor has addressed the issue in QTS 5.2.8.3332 build 20251128 and later, as well as in QuTS hero h5.2.8.3321 build 20251117 and h5.3.1.3250 build 20250912 and later. No public exploits have been reported, and the vulnerability was reserved in August 2025 and published in January 2026. This suggests the issue was responsibly disclosed and patched before widespread exploitation.

Potential Impact

For European organizations, the primary impact of CVE-2025-9110 lies in the potential unauthorized disclosure of sensitive application data stored or processed on QNAP NAS devices running vulnerable QTS versions. While the vulnerability does not directly compromise system integrity or availability, the exposure of sensitive information could aid attackers in planning more targeted attacks, such as credential theft, lateral movement, or data exfiltration. Organizations relying heavily on QNAP NAS for critical data storage, backup, or file sharing may face increased risk of data leakage. This is particularly relevant for sectors with stringent data protection requirements, such as finance, healthcare, and government. Additionally, the low complexity and lack of required privileges make it accessible to a wide range of attackers, increasing the likelihood of opportunistic scanning and exploitation attempts. However, the absence of known exploits in the wild and the availability of patches mitigate immediate widespread risk. The impact is thus considered low but non-negligible, especially for organizations with exposed NAS devices or weak network segmentation.

Mitigation Recommendations

1. Immediately update all QNAP NAS devices running QTS 5.2.x or affected QuTS hero versions to the patched releases: QTS 5.2.8.3332 build 20251128 or later, QuTS hero h5.2.8.3321 build 20251117 or later, and h5.3.1.3250 build 20250912 or later. 2. Restrict network access to NAS devices by implementing strict firewall rules, allowing only trusted IP addresses and internal networks to connect. 3. Disable any unnecessary services or ports on the NAS to reduce the attack surface. 4. Employ network segmentation to isolate NAS devices from general user networks and the internet, minimizing exposure. 5. Monitor NAS device logs and network traffic for unusual access patterns or data retrieval activities that could indicate exploitation attempts. 6. Regularly audit and review user permissions and application configurations on NAS devices to ensure least privilege principles. 7. Educate IT and security teams about this vulnerability and ensure timely patch management processes are in place for all networked devices. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous behavior related to QNAP NAS exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2025-08-18T08:29:16.532Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6957e42ddb813ff03ef241dd

Added to database: 1/2/2026, 3:28:45 PM

Last enriched: 1/2/2026, 3:44:36 PM

Last updated: 1/8/2026, 6:17:13 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats