QNAP fixed three flaws in its NAS devices, including an authentication bypass

QNAP addressed three vulnerabilities in its NAS products that can be exploited to access devices.

QNAP addressed three vulnerabilities in Network Attached Storage (NAS) devices that can be exploited to access the devices.

The three flaws fixed are:

  • CVE-2024-21899: an improper authentication vulnerability could allow users to compromise the security of the system via a network.
  • CVE-2024-21900: an injection vulnerability could allow authenticated users to execute commands via a network.
  • CVE-2024-21901: an SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network.

The vulnerability CVE-2024-21899 (CVSS score 9.8) is the most severe of the above issues, it can be exploited by an unauthenticated, remote attacker.

Below is the list of the vulnerable versions and the versions released by the Taiwanese vendor to address the issues:

Affected Product Fixed Version
QTS 5.1.x QTS 5.1.3.2578 build 20231110 and later
QTS 4.5.x QTS 4.5.4.2627 build 20231225 and later
QuTS hero h5.1.x QuTS hero h5.1.3.2578 build 20231110 and later
QuTS hero h4.5.x QuTS hero h4.5.4.2626 build 20231225 and later
QuTScloud c5.x QuTScloud c5.1.5.2651 and later
myQNAPcloud 1.0.x myQNAPcloud 1.0.52 (2023/11/24) and later

The advisory includes instructions for updating QTS, QuTS hero, QuTScloud, and myQNAPcloud.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(SecurityAffairs – hacking, NAS)

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to our Newsletter