Cyber Posture

CVE-2025-52868

High

Published: 11 February 2026

Published
11 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0014 34.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes. We have already fixed the vulnerability in the following…

more

version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the buffer overflow by requiring timely application of the vendor patch released for Qsync Central 5.0.0.4 and later.

prevent

Provides memory protections such as ASLR, stack canaries, and DEP to prevent exploitation of buffer overflows leading to memory modification or crashes.

prevent

Enforces bounds checking and validation of network inputs to Qsync Central to block buffer overflow attempts from oversized or malformed data.

Security SummaryAI

CVE-2025-52868 is a buffer overflow vulnerability (CWE-120, CWE-122) affecting Qsync Central, a component of QNAP systems. The issue allows memory modification or process crashes when exploited. It has a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), indicating high severity due to network accessibility, low attack complexity, and requirements for low-privilege (user account) access.

A remote attacker who obtains a valid user account on the affected Qsync Central instance can exploit the vulnerability over the network without user interaction. Successful exploitation enables arbitrary memory modification, potentially leading to integrity violations, or denial-of-service via process crashes, though no confidentiality impact is reported.

QNAP's security advisory (QSA-26-02) confirms the vulnerability has been addressed in Qsync Central version 5.0.0.4, released on 2026/01/20, and all later versions. Security practitioners should update to these patched versions immediately and review access controls to limit user account privileges.

Details

CWE(s)

Affected Products

qnap
qsync central
5.0.0.0 — 5.0.0.4

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Buffer overflow enables arbitrary memory modification from low-privilege access, facilitating exploitation for privilege escalation (T1068); explicit process crashes enable endpoint DoS via application exploitation (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References