In a recent security audit, researchers uncovered 15 vulnerabilities in QNAP’s QTS, the operating system powering the company’s network-attached storage (NAS) devices. Read on to learn more.
Out of the 15 QNAP QTS vulnerabilities, 11 remain unpatched. Among the unpatched issues is CVE-2024-27130, a critical stack buffer overflow vulnerability in the ‘No_Support_ACL’ function of ‘share.cgi.’ This vulnerability is particularly dangerous as it can lead to remote code execution (RCE) under specific conditions.
Exploitation of this vulnerability requires an attacker to obtain a valid shared file link (‘ssid’) from a NAS user. Despite researchers reporting these issues to QNAP between December 2023 and January 2024, only four vulnerabilities have been addressed so far. WatchTowr Labs, the team behind this discovery, has publicly released details and a proof of concept (PoC) exploit for CVE-2024-27130.
With these vulnerabilities now publicly known, it is highly likely that threat actors will attempt to create their own exploits to target vulnerable NAS instances.
At Nuspire, we take such threats seriously. We promptly apply patches in line with vendor recommendations and actively hunt for any signs of compromise within our client environments.
If your organization uses QNAP NAS devices, it is crucial to take immediate steps to protect your systems. Here are some recommended actions:
By following these steps, you can significantly reduce the risk of your QNAP NAS devices being compromised. Staying proactive and vigilant is key in managing and mitigating the impact of these newly disclosed vulnerabilities. Furthermore, consistent vulnerability management and timely patching are vital to minimizing these risks and keeping your network secure.