• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical php vulnerability exposes qnap nas devices to remote attacks

Critical PHP Vulnerability Exposes QNAP NAS Devices to Remote Attacks

You are here: Home / General Cyber Security News / Critical PHP Vulnerability Exposes QNAP NAS Devices to Remote Attacks
June 23, 2022

QNAP, Taiwanese maker of network-hooked up storage (NAS) devices, on Wednesday stated it truly is in the approach of correcting a critical a few-12 months-previous PHP vulnerability that could be abused to achieve remote code execution.

“A vulnerability has been documented to have an affect on PHP versions 7.1.x below 7.1.33, 7.2.x underneath 7.2.24, and 7.3.x under 7.3.11 with improper nginx config,” the components vendor explained in an advisory. “If exploited, the vulnerability will allow attackers to acquire remote code execution.”

CyberSecurity

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The vulnerability, tracked as CVE-2019-11043, is rated 9.8 out of 10 for severity on the CVSS vulnerability scoring procedure. That said, it really is required that Nginx and php-fpm are running in appliances making use of the subsequent QNAP functioning process variations –

  • QTS 5..x and later on
  • QTS 4.5.x and afterwards
  • QuTS hero h5..x and afterwards
  • QuTS hero h4.5.x and later
  • QuTScloud c5..x and later

“As QTS, QuTS hero or QuTScloud does not have nginx mounted by default, QNAP NAS are not afflicted by this vulnerability in the default point out,” the corporation said, including it experienced now mitigated the issue in OS variations QTS 5..1.2034 establish 20220515 and QuTS hero h5…2069 make 20220614.

The notify will come a week immediately after QNAP disclosed that it is “totally investigating” still yet another wave of DeadBolt ransomware attacks concentrating on QNAP NAS equipment jogging out-of-date versions of QTS 4.x.

CyberSecurity

Other than urging customers to improve to the most recent variation of QTS or QuTS hero working methods, it’s also recommending that the devices are not uncovered to the internet.

On top of that, QNAP has advised consumers who are unable to track down the ransom note just after upgrading the firmware to enter the gained DeadBolt decryption crucial to get to out to QNAP Help for help.

“If your NAS has currently been compromised, consider the screenshot of the ransom observe to continue to keep the bitcoin deal with, then enhance to the newest firmware variation and the constructed-in Malware Remover application will immediately quarantine the ransom notice which hijacks the login web page,” it reported.

Discovered this posting fascinating? Stick to THN on Fb, Twitter  and LinkedIn to browse more distinctive written content we post.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News #InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties
Next Post: How secure is Gmail? how secure is gmail?»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.