QNAP addressed three vulnerabilities in Network Attached Storage (NAS) devices that can be exploited to access the devices.
The three flaws fixed are:
The vulnerability CVE-2024-21899 (CVSS score 9.8) is the most severe of the above issues, it can be exploited by an unauthenticated, remote attacker.
Below is the list of the vulnerable versions and the versions released by the Taiwanese vendor to address the issues:
Affected Product | Fixed Version |
QTS 5.1.x | QTS 5.1.3.2578 build 20231110 and later |
QTS 4.5.x | QTS 4.5.4.2627 build 20231225 and later |
QuTS hero h5.1.x | QuTS hero h5.1.3.2578 build 20231110 and later |
QuTS hero h4.5.x | QuTS hero h4.5.4.2626 build 20231225 and later |
QuTScloud c5.x | QuTScloud c5.1.5.2651 and later |
myQNAPcloud 1.0.x | myQNAPcloud 1.0.52 (2023/11/24) and later |
The advisory includes instructions for updating QTS, QuTS hero, QuTScloud, and myQNAPcloud.
Follow me on Twitter: @securityaffairs and Facebook
(SecurityAffairs – hacking, NAS)