• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
qnap advises users to update nas firmware to patch apache

QNAP Advises Users to Update NAS Firmware to Patch Apache HTTP Vulnerabilities

You are here: Home / General Cyber Security News / QNAP Advises Users to Update NAS Firmware to Patch Apache HTTP Vulnerabilities
April 22, 2022

Network-connected storage (NAS) appliance maker QNAP on Thursday stated it is really investigating its lineup for probable effects arising from two security vulnerabilities that have been addressed in the Apache HTTP server previous thirty day period.

The critical flaws, tracked as CVE-2022-22721 and CVE-2022-23943, are rated 9.8 for severity on the CVSS scoring method and impression Apache HTTP Server variations 2.4.52 and previously –

  • CVE-2022-22721 – Possible buffer overflow with incredibly huge or unlimited LimitXMLRequestBody
  • CVE-2022-23943 – Out-of-bounds Create vulnerability in mod_sed of Apache HTTP Server

The two the vulnerabilities, alongside CVE-2022-22719 and CVE-2022-22720, were remediated by the task maintainers as component of model 2.4.53, which was delivered on March 14, 2022.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

“Though CVE-2022-22719 and CVE-2022-22720 do not affect QNAP goods, CVE-2022-22721 has an effect on 32-little bit QNAP NAS types, and CVE-2022-23943 affects people who have enabled mod_sed in Apache HTTP Server on their QNAP product,” the Taiwanese enterprise explained in an notify printed this 7 days.

In the absence of readily accessible security updates, QNAP has made available workarounds, including “retaining the default benefit ‘1M’ for LimitXMLRequestBody” and disabling mod_sed, introducing that the mod_sed feature is disabled by default in Apache HTTP Server on NAS units running the QTS running process.

The advisory will come virtually a thirty day period after it disclosed that it is really doing the job to solve an infinite loop vulnerability in OpenSSL (CVE-2022-0778, CVSS rating: 7.5) and produced patches for the Dirty Pipe Linux flaw (CVE-2022-0847, CVSS score: 7.8).

Observed this write-up interesting? Abide by THN on Facebook, Twitter  and LinkedIn to go through additional special information we submit.


Some components of this post are sourced from:
thehackernews.com

Previous Post: «cisco releases security patches for telepresence, roomos and umbrella va Cisco Releases Security Patches for TelePresence, RoomOS and Umbrella VA
Next Post: Crypto-Mining Botnet Goes After Misconfigured Docker APIs Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.