Last week, QNAP released a security advisory in which multiple vulnerabilities were fixed in QTS, QuTS hero and QuTScloud products.
The vulnerabilities were assigned with CVE-2023-47218 and CVE-2023-50358. The severity of these vulnerabilities were given as 5.8 (Medium).
However, it has been discovered that there were a total of 289,665 vulnerable devices that are potentially exploitable by threat actors.
Prevent malware from infecting your network at the delivery stage by intercepting malicious files in transit from their source to the target device’s web browser. .
These devices most existed in Germany, USA, China, Italy, Japan, Taiwan, France, and several other nations.
Palo Alto said that, this vulnerability is associated with a command injection which exists in the quick.cgi component of QNAP QTS firmware that can be accessed without authentication. QNAP QTS stands for (QNAP Turbo network attached storage System).
When setting the HTTP parameter todo=set_timeinfo, the quick.cgi request handler saves the value of the parameter SPECIFIC_SERVER into the configuration file /tmp/quick/quick_tmp.conf under the name NTP Address.
After this, the quick.cgi component starts time synchronization with the ntpdate utility where the command-line execution happens.
This utility reads the NTP Address in the quick_tmp.conf file which is then executed using system().
This means that if an untrusted input is provided in the SPECIFIC_SERVER parameter, it is passed through the phases and executed via system() resulting in an arbitrary command execution on the vulnerable device.
In order to mitigate this vulnerability, users can follow the below mentioned steps
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.
Security researchers at Fortinet's FortiGuard Labs have uncovered a sophisticated phishing campaign that uses weaponized…
British retail giant Marks & Spencer (M&S) has confirmed it is dealing with a significant…
In the face of relentless cyber threats and an ever-expanding digital attack surface, security leaders…
A sophisticated backdoor targeting various large Russian organizations across government, finance, and industrial sectors has…
In an era where cyber threats evolve faster than defense mechanisms, Chief Information Security Officers…
Zyxel Networks has released critical security patches to address two high-severity vulnerabilities in its USG…