Description
An improper certificate validation vulnerability has been reported to affect Video Station. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to compromise the security of the system.

We have already fixed the vulnerability in the following version:
Video Station 5.8.2 and later
Published: 2026-03-11
Score: 0.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Local System Compromise
Action: Patch
AI Analysis

Impact

The vulnerability is an improper certificate validation flaw in QNAP Video Station. According to the vendor description, an attacker who has already gained local network access and an administrator account can exploit this weakness to compromise the security of the system. This results in the attacker achieving full control over the affected device and potentially accessing or tampering with data stored or streamed by Video Station.

Affected Systems

The affected product is QNAP Systems Inc. Video Station. The official solution notes that versions before 5.8.2 are vulnerable, with the issue fixed in Video Station 5.8.2 and later. No specific version ranges are given beyond that, so any release older than 5.8.2 should be considered at risk. The Common Platform Enumeration entry is cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*.

Risk and Exploitability

The CVSS score is 0.1, indicating a very low severity impact, and the EPSS score is quoted as less than 1%, underscoring the low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Because the exploit requires local network presence and an administrator account, the attack vector is inferred to be local. The low CVSS and EPSS, combined with the prerequisite of administrative credentials, suggest that while the threat is real, its practical risk is minimal for well‑secured environments. However, any administrative user exposed on the local network creates a potential attack surface.

Generated by OpenCVE AI on March 17, 2026 at 14:45 UTC.

Remediation

Vendor Solution

We have already fixed the vulnerability in the following version: Video Station 5.8.2 and later


OpenCVE Recommended Actions

  • Upgrade QNAP Video Station to version 5.8.2 or later.

Generated by OpenCVE AI on March 17, 2026 at 14:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Qnap
Qnap video Station
CPEs cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*
Vendors & Products Qnap
Qnap video Station
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Qnap Systems
Qnap Systems video Station
Vendors & Products Qnap Systems
Qnap Systems video Station

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
References

Wed, 11 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
References

Wed, 11 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
Description An improper certificate validation vulnerability has been reported to affect Video Station. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to compromise the security of the system. We have already fixed the vulnerability in the following version: Video Station 5.8.2 and later
Title Video Station
Weaknesses CWE-295
References
Metrics cvssV4_0

{'score': 0.1, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:U'}


Subscriptions

Qnap Video Station
Qnap Systems Video Station
cve-icon MITRE

Status: PUBLISHED

Assigner: qnap

Published:

Updated: 2026-03-11T14:12:35.283Z

Reserved: 2026-03-09T01:16:12.021Z

Link: CVE-2024-14024

cve-icon Vulnrichment

Updated: 2026-03-11T14:12:31.158Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T08:16:01.633

Modified: 2026-03-13T13:06:17.493

Link: CVE-2024-14024

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:37:35Z

Weaknesses