• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
qnap advises users to update nas firmware to patch apache

QNAP Advises Users to Update NAS Firmware to Patch Apache HTTP Vulnerabilities

You are here: Home / General Cyber Security News / QNAP Advises Users to Update NAS Firmware to Patch Apache HTTP Vulnerabilities
April 22, 2022

Network-connected storage (NAS) appliance maker QNAP on Thursday stated it is really investigating its lineup for probable effects arising from two security vulnerabilities that have been addressed in the Apache HTTP server previous thirty day period.

The critical flaws, tracked as CVE-2022-22721 and CVE-2022-23943, are rated 9.8 for severity on the CVSS scoring method and impression Apache HTTP Server variations 2.4.52 and previously –

  • CVE-2022-22721 – Possible buffer overflow with incredibly huge or unlimited LimitXMLRequestBody
  • CVE-2022-23943 – Out-of-bounds Create vulnerability in mod_sed of Apache HTTP Server

The two the vulnerabilities, alongside CVE-2022-22719 and CVE-2022-22720, were remediated by the task maintainers as component of model 2.4.53, which was delivered on March 14, 2022.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

“Though CVE-2022-22719 and CVE-2022-22720 do not affect QNAP goods, CVE-2022-22721 has an effect on 32-little bit QNAP NAS types, and CVE-2022-23943 affects people who have enabled mod_sed in Apache HTTP Server on their QNAP product,” the Taiwanese enterprise explained in an notify printed this 7 days.

In the absence of readily accessible security updates, QNAP has made available workarounds, including “retaining the default benefit ‘1M’ for LimitXMLRequestBody” and disabling mod_sed, introducing that the mod_sed feature is disabled by default in Apache HTTP Server on NAS units running the QTS running process.

The advisory will come virtually a thirty day period after it disclosed that it is really doing the job to solve an infinite loop vulnerability in OpenSSL (CVE-2022-0778, CVSS rating: 7.5) and produced patches for the Dirty Pipe Linux flaw (CVE-2022-0847, CVSS score: 7.8).

Observed this write-up interesting? Abide by THN on Facebook, Twitter  and LinkedIn to go through additional special information we submit.


Some components of this post are sourced from:
thehackernews.com

Previous Post: «cisco releases security patches for telepresence, roomos and umbrella va Cisco Releases Security Patches for TelePresence, RoomOS and Umbrella VA
Next Post: Crypto-Mining Botnet Goes After Misconfigured Docker APIs Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • WhatsApp Unveils Proxy Support to Tackle Internet Censorship
  • Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
  • Blind Eagle Hacking Group Targets South America With New Tools
  • US Family Planning Non-Profit MFHS Confirms Ransomware Attack
  • Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
  • Dridex Malware Now Attacking macOS Systems with Novel Infection Method
  • Cyber attacks on UK organisations surged 77% in 2022, new research finds
  • WhatsApp to combat internet blackouts with proxy server support
  • The IT Pro Podcast: Going passwordless
  • Podcast transcript: Going passwordless

Copyright © TheCyberSecurity.News, All Rights Reserved.