BOOK THIS SPACE FOR AD
ARTICLE AD
QNAP fixed three flaws in its NAS devices, including an authentication bypass
QNAP addressed three vulnerabilities in its NAS products that can be exploited to access devices.
QNAP addressed three vulnerabilities in Network Attached Storage (NAS) devices that can be exploited to access the devices.
The three flaws fixed are:
CVE-2024-21899: an improper authentication vulnerability could allow users to compromise the security of the system via a network. CVE-2024-21900: an injection vulnerability could allow authenticated users to execute commands via a network. CVE-2024-21901: an SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network.The vulnerability CVE-2024-21899 (CVSS score 9.8) is the most severe of the above issues, it can be exploited by an unauthenticated, remote attacker.
Below is the list of the vulnerable versions and the versions released by the Taiwanese vendor to address the issues:
Affected Product | Fixed Version |
QTS 5.1.x | QTS 5.1.3.2578 build 20231110 and later |
QTS 4.5.x | QTS 4.5.4.2627 build 20231225 and later |
QuTS hero h5.1.x | QuTS hero h5.1.3.2578 build 20231110 and later |
QuTS hero h4.5.x | QuTS hero h4.5.4.2626 build 20231225 and later |
QuTScloud c5.x | QuTScloud c5.1.5.2651 and later |
myQNAPcloud 1.0.x | myQNAPcloud 1.0.52 (2023/11/24) and later |
The advisory includes instructions for updating QTS, QuTS hero, QuTScloud, and myQNAPcloud.
Follow me on Twitter: @securityaffairs and Facebook
(SecurityAffairs – hacking, NAS)