QNAP NAS Devices at Risk of Remote Malicious Code Injection
Reading Time: 3 Minutes
QNAP, a provider of Network-Attached Storage (NAS) devices, has issued a warning to its customers to install firmware updates that resolve a critical security vulnerability on its devices.
The flaw, tracked as CVE-2022-27596, is rated as “Critical” by QNAP, with a CVSS v3 score of 9.8, and is described as a SQL injection flaw.
The vulnerability impacts the QTS 5.0.1 and QuTS hero h5.0.1 versions of the operating system and could allow remote attackers to inject malicious code.
See Also: So you want to be a hacker?
Offensive Security, Bug Bounty Courses
QNAP advise for device protection
QNAP has advised users running the affected versions of the operating system to upgrade to QTS 5.0.1.2234 build 20221201 or later, and QuTS hero h5.0.1.2248 build 20221215 or later, to ensure the protection of their devices.
The update can be performed by logging in as the admin user and navigating to the firmware update section in the Control Panel, or by downloading the update from QNAP’s Download Center.
It is important for users to apply these security updates as soon as possible, as threat actors are known to target vulnerabilities in QNAP devices.
The company’s devices are already the target of ongoing ransomware campaigns, such as DeadBolt and eCh0raix, which abuse vulnerabilities to encrypt data on exposed NAS devices.
Trending: Offensive Security Tool: XSSRocket
Always check for updates
In conclusion, the critical security vulnerability reported by QNAP highlights the importance of keeping device firmware updated to ensure the protection of sensitive data.
Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?
If you want to express your idea in an article contact us here for a quote: [email protected]
Source: bleepingcomputer.com