CVE-2024-14024
Plain English Summary
AI-powered analysis for quick understanding
An attacker with access to the local network and an administrator account can exploit a flaw in Video Station to bypass security measures and potentially compromise the system. This vulnerability has been fixed in version 5.8.2 and later, so it's important to update to that version or newer.
Technical Description
An improper certificate validation vulnerability has been reported to affect Video Station. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to compromise the security of the system. We have already fixed the vulnerability in the following version: Video Station 5.8.2 and later
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:P/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 11, 2026
28 days ago
Last Modified
Mar 13, 2026
25 days ago
Vendor
qnap
Product
video station
Related Vulnerabilities
This vulnerability allows an attacker with a user account and access to the local network to run any commands on the affected QNAP devices. To exploit it, they need to already be on the same network and have valid login credentials.
An attacker with administrator access on the local network can exploit a flaw in Video Station to run unauthorized commands or code. This vulnerability has been fixed in version 5.8.2 and later, so updating is essential to protect against this risk.
This vulnerability allows an attacker with valid login credentials to run malicious commands on affected QNAP NVR devices over the network. It specifically impacts older models using QVR Firmware 4.x, but has been fixed in version 5.0.0 and later.