Image default

QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates

Jan 31, 2023Ravie LakshmananData Security / Vulnerability

Critical Vulnerability

Taiwanese company QNAP has released updates to remediate a critical security flaw affecting its network-attached storage (NAS) devices that could lead to arbitrary code injection.

Tracked as CVE-2022-27596, the vulnerability is rated 9.8 out of a maximum of 10 on the CVSS scoring scale. It affects QTS 5.0.1 and QuTS hero h5.0.1.

“If exploited, this vulnerability allows remote attackers to inject malicious code,” QNAP said in an advisory released Monday.

The exact technical specifics surrounding the flaw are unclear, but the NIST National Vulnerability Database (NVD) has categorized it as an SQL injection vulnerability.

This means an attacker could send specially crafted SQL queries such that they could be weaponized to bypass security controls and access or alter valuable information.

“Just as it may be possible to read sensitive information, it is also possible to make changes or even delete this information with a SQL injection attack,” according to MITRE.

The vulnerability has been addressed in versions QTS build 20221201 and later, as well as QuTS hero h5.0.1.2248 build 20221215 and later.

Zero-day vulnerabilities in exposed QNAP appliances have been put to use by DeadBolt ransomware actors to breach target networks, making it essential to update to the latest version in order to mitigate potential threats.

To apply the updates, users are advised to log in to QTS or QuTS hero as an administrator, navigate to Control Panel > System > Firmware Update, and select “Check for Update” under the “Live Update” section.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


Related posts

Qualcomm Aware brings software as a service to IoT silicon

James Horns

Top 5 trends to watch in industrial IoT

James Horns

North Korea’s APT37 Targeting Southern Counterpart with New M2RAT Malware

James Horns

Honeypot-Factory: The Use of Deception in ICS/OT Environments

James Horns

ISC Releases Security Patches for New BIND DNS Software Vulnerabilities

James Horns

Shocking Findings from the 2023 Third-Party App Access Report

James Horns

Leave a Comment