QNAP Releases Patch for 2 Critical Flaws Threatening Your NAS Devices

QNAP

QNAP has released security updates to address two critical security flaws impacting its operating system that could result in arbitrary code execution.

Tracked as CVE-2023-23368 (CVSS score: 9.8), the vulnerability is described as a command injection bug affecting QTS, QuTS hero, and QuTScloud.

“If exploited, the vulnerability could allow remote attackers to execute commands via a network,” the company said in an advisory published over the weekend.

The shortcoming spans the below versions –

  • QTS 5.0.x (Fixed in QTS 5.0.1.2376 build 20230421 and later)
  • QTS 4.5.x (Fixed in QTS 4.5.4.2374 build 20230416 and later)
  • QuTS hero h5.0.x (Fixed in QuTS hero h5.0.1.2376 build 20230421 and later)
  • QuTS hero h4.5.x (Fixed in QuTS hero h4.5.4.2374 build 20230417 and later)
  • QuTScloud c5.0.x (Fixed in QuTScloud c5.0.1.2374 and later)

Also fixed by QNAP is another command injection flaw in QTS, Multimedia Console, and Media Streaming add-on (CVE-2023-23369, CVSS score: 9.0) that could allow remote attackers to execute commands via a network.

The following versions of the software are impacted –

  • QTS 5.1.x (Fixed in QTS 5.1.0.2399 build 20230515 and later)
  • QTS 4.3.6 (Fixed in QTS 4.3.6.2441 build 20230621 and later)
  • QTS 4.3.4 (Fixed in QTS 4.3.4.2451 build 20230621 and later)
  • QTS 4.3.3 (Fixed in QTS 4.3.3.2420 build 20230621 and later)
  • QTS 4.2.x (Fixed in QTS 4.2.6 build 20230621 and later)
  • Multimedia Console 2.1.x (Fixed in Multimedia Console 2.1.2 (2023/05/04) and later)
  • Multimedia Console 1.4.x (Fixed in Multimedia Console 1.4.8 (2023/05/05) and later)
  • Media Streaming add-on 500.1.x (Fixed in Media Streaming add-on 500.1.1.2 (2023/06/12) and later)
  • Media Streaming add-on 500.0.x (Fixed in Media Streaming add-on 500.0.0.11 (2023/06/16) and later)

With QNAP devices exploited for ransomware attacks in the past, users running one of the aforementioned versions are urged to update to the latest version to mitigate potential threats.

The development comes weeks after the Taiwanese company disclosed it took down a malicious server used in widespread brute-force attacks targeting internet-exposed network-attached storage (NAS) devices with weak passwords.



Original Source



A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

 To keep up to date follow us on the below channels.