QNAP has disclosed multiple vulnerabilities across its network-attached storage (NAS) systems, which could allow hackers to take control of affected devices.
The vulnerabilities impact several versions of QNAP’s operating systems and applications, including QTS, QuTS hero, QuTScloud, and myQNAPcloud.
CVE-2024-21899: Improper Authentication Vulnerability
This critical flaw could allow unauthorized users to compromise the system’s security via a network.
By exploiting this vulnerability, attackers could bypass authentication mechanisms to gain unauthorized access to the device.
CVE-2024-21900: Command Injection Vulnerability
This vulnerability allows authenticated users to execute arbitrary commands on the system via a network.
Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide
This could enable attackers who have already gained initial access to escalate their privileges or perform unauthorized actions on the device.
CVE-2024-21901: SQL Injection Vulnerability
A particularly concerning issue for system administrators is that this SQL injection vulnerability could allow authenticated administrators to inject malicious SQL code into the system.
This could lead to data manipulation or theft, compromising the security and integrity of the data stored on the NAS.
CVE-2024-27124: OS Command Injection Vulnerability
This vulnerability is an OS command injection flaw that, if exploited, could allow attackers to execute arbitrary commands over a network.
Such a breach could lead to full system compromise, data theft, or network infiltration. QNAP has not yet released a patch for CVE-2024-27124.
CVE-2024-32764: Missing Authentication for Critical Function
CVE-2024-32764 is a severe security flaw from missing critical function authentication checks.
Attackers could exploit this vulnerability to gain unauthorized access to these functions via a network without needing to authenticate, potentially leading to unauthorized operations and system control.
QNAP is currently working on fixing this vulnerability.
Users should stay vigilant and update their NAS firmware when the security patch is released.
CVE-2024-32766: OS Command Injection Vulnerability
Similar to CVE-2024-27124, CVE-2024-32766 is another OS command injection vulnerability.
It allows attackers to execute commands via a network, which could result in unauthorized access and control over the affected NAS devices.
The company is in the process of developing a security patch.
Users are encouraged to watch official communications from QNAP for immediate updates.
Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:
If you want to test all these features now with completely free access to the sandbox:
QNAP has promptly addressed these vulnerabilities in the following product versions:
QNAP urges all users to update their systems and applications to the latest versions to mitigate these vulnerabilities.
Regular updates are crucial for maintaining the security of your devices.
To update your QNAP device, follow these steps:
For updating myQNAPcloud:
The swift response by QNAP in fixing these vulnerabilities shows their commitment to user security.
However, this incident serves as a reminder of the constant vigilance required in the digital age, where the integrity and security of data are perpetually at risk.
Users are advised to adhere to recommended security practices and update their devices promptly to protect against potential threats.
Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo
Docker Compose, a cornerstone tool for developers managing containerized application harbors a high-severity vulnerability that…
A sophisticated Android banking trojan named Herodotus has emerged on the mobile threat landscape, introducing…
Cybercriminals have developed a sophisticated phishing technique that exploits invisible characters embedded within email subject…
Security researcher Eaton Zveare has disclosed critical vulnerabilities in Tata Motors' systems that exposed over…
Pentest Copilot is an innovative open-source tool that leverages AI to help ethical hackers streamline…
A sophisticated information-stealing malware named Anivia Stealer has emerged on underground forums, marketed by a…