Warning - Vulnerability in QNAP QTS and QuTS hero
If exploited, this vulnerability could allow remote attackers to inject malicious code.
A vulnerability has been reported that affect QNAP devices running QTS 5.0.1 and QuTS hero h5.0.1. If exploited, this vulnerability could allow remote attackers to inject malicious code. QNAP has fixed this vulnerability in the following operating system versions:
- QTS 220.127.116.114 build 20221201 and later
- QuTS hero h18.104.22.1688 build 20221215 and later
The vendor did not mention if this vulnerability is exploited in the wild.
To secure your device, QNAP and the CCB recommend to regularly update your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.
Updating QTS or QuTS hero
- Log in to QTS or QuTS hero as an administrator.
- Go to Control Panel > System > Firmware Update.
- Under Live Update, click Check for Update -> QTS or QuTS hero downloads and installs the latest available update.
You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.
QNAP NAS should not be directly connected to the internet. Use the myQNAPcloud Link feature provided by QNAP, or enable the VPN service, to limit your attack surface.
The CCB recommends organisations to upscale monitoring and detection capabilities and to detect any related suspicious activity, ensuring a fast response in case of an intrusion.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
When applying patches to systems that have been vulnerable to an RCE exploit, a proactive threat assessment should be performed to verify no exploitation occurred in the time between a patch becoming available and being applied.
QNAP Product Support Status - https://www.qnap.com/en/product/eol.php