www.belgium.be Logo of the federal government

Warning - Vulnerability in QNAP QTS and QuTS hero

Référence: 
Advisory #2023-0013
Version: 
1.0
Logiciels concernés : 
QNAP - QTS 5.0.1
QNAP - QuTS hero h5.0.1
Type: 
Remote Code Injection
CVE/CVSS: 

CVE-2022-27596

Sources

QNAP - https://www.qnap.com/en/security-advisory/qsa-23-01

Risques

If exploited, this vulnerability could allow remote attackers to inject malicious code.

Description

A vulnerability has been reported that affect QNAP devices running QTS 5.0.1 and QuTS hero h5.0.1. If exploited, this vulnerability could allow remote attackers to inject malicious code. QNAP has fixed this vulnerability in the following operating system versions:

  • QTS 5.0.1.2234 build 20221201 and later
  • QuTS hero h5.0.1.2248 build 20221215 and later

The vendor did not mention if this vulnerability is exploited in the wild.

Actions recommandées

To secure your device, QNAP and the CCB recommend to regularly update your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.

Updating QTS or QuTS hero

  1. Log in to QTS or QuTS hero as an administrator.
  2. Go to Control Panel > System > Firmware Update.
  3. Under Live Update, click Check for Update -> QTS or QuTS hero downloads and installs the latest available update.

You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.

Extra Precautions

QNAP NAS should not be directly connected to the internet. Use the myQNAPcloud Link feature provided by QNAP, or enable the VPN service, to limit your attack surface.

Monitor/Detect

The CCB recommends organisations to upscale monitoring and detection capabilities and to detect any related suspicious activity, ensuring a fast response in case of an intrusion.

While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.

When applying patches to systems that have been vulnerable to an RCE exploit, a proactive threat assessment should be performed to verify no exploitation occurred in the time between a patch becoming available and being applied.

 

Références

NVD - https://nvd.nist.gov/vuln/detail/CVE-2022-27596

QNAP Product Support Status - https://www.qnap.com/en/product/eol.php