U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-50358

Change History

Initial Analysis by NIST 12/10/2025 4:17:29 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:qnap:qts:4.2.6:-:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20170517:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20190322:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20190730:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20190921:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20191107:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20200109:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20200421:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20200611:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20200821:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20210327:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20211215:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20221028:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20220623:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20220304:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:5.1.5.2645:-:*:*:*:*:*:*
          *cpe:2.3:o:qnap:quts_hero:h5.1.5.2647:-:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.5.4.2627:-:*:*:*:*:*:*
          *cpe:2.3:o:qnap:quts_hero:h4.5.4.2626:-:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:4.2.6:build_20230621:*:*:*:*:*:*
          *cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:* versions from (including) 4.5.1 up to (excluding) 4.5.4.2627
          *cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:* versions from (including) h4.5.0 up to (excluding) h4.5.4.2626
          *cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:* versions from (including) c5.0.0.1919 up to (excluding) c5.1.5.2651
          *cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:* versions from (including) 4.2.0 up to (excluding) 4.2.6
          *cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:* versions from (including) 4.3.0 up to (excluding) 4.3.3.2644
          *cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:* versions from (including) 4.3.4 up to (excluding) 4.3.4.2675
          *cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:* versions from (including) 4.3.5 up to (excluding) 4.3.6.2665
          *cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:* versions from (including) 5.1.0 up to (excluding) 5.1.5.2645
          *cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:* versions from (including) h5.0.0 up to (excluding) h5.1.5.2647
Added Reference Type

								
							
							
						
CVE: https://unit42.paloaltonetworks.com/qnap-qts-firmware-cve-2023-50358/ Types: Exploit, Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032 Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://www.qnap.com/en/security-advisory/qsa-23-57 Types: Vendor Advisory
Added Reference Type

								
							
							
						
QNAP Systems, Inc.: https://unit42.paloaltonetworks.com/qnap-qts-firmware-cve-2023-50358/ Types: Exploit, Third Party Advisory
Added Reference Type

								
							
							
						
QNAP Systems, Inc.: https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032 Types: Third Party Advisory
Added Reference Type

								
							
							
						
QNAP Systems, Inc.: https://www.qnap.com/en/security-advisory/qsa-23-57 Types: Vendor Advisory