TLP : CLEAR
Date : 29/04/2024
REF NO : CERT / 2024/04/36
Severity Level: Medium
Components Affected
Overview
Multiple vulnerabilities were identified in QNAP NAS. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, security restriction bypass and sensitive information disclosure on the targeted system.
Description
Multiple vulnerabilities have been reported affecting QuFirewall and several QNAP operating system versions. A path traversal vulnerability in QuFirewall, fixed in version 2.4.1 (2024/02/01) and later, could allow authenticated administrators to read unexpected files and expose sensitive data. Similarly, several QNAP OS versions were susceptible to a path traversal vulnerability, addressed in QTS 5.1.4.2596 build 20231128, QTS 4.5.4.2627 build 20231225, QuTS hero h5.1.3.2578 build 20231110, h4.5.4.2626 build 20231225, and QuTScloud c5.1.5.2651 and later. Additionally, a buffer copy vulnerability, fixed in QTS 5.1.6.2722 build 20240402 and QuTS hero h5.1.6.2734 build 20240414 and later, could allow authenticated users to execute code. An incorrect authorization vulnerability, fixed in the same builds, could enable access restriction bypass. Finally, an integer overflow vulnerability, resolved in QTS 5.1.3.2578 build 20231110, QuTS hero h5.1.3.2578 build 20231110, and QuTScloud c5.1.5.2651 and later, could compromise system security.
Impact
Solution/ Workarounds
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
Reference
Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.
Sri Lanka Computer Emergency Readiness Team | Coordination Centre