• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

QNAP: Patch Critical Remote Code Injection Bug

You are here: Home / General Cyber Security News / QNAP: Patch Critical Remote Code Injection Bug
January 31, 2023

A main Taiwanese hardware producer is urging its buyers to patch a critical vulnerability in equipment managing the QTS or QuTS hero firmware.

Network-hooked up storage (NAS) device maker QNAP claimed in the advisory yesterday that CVE-2022-27596 impacts QTS 5..1 and QuTS hero h5..1.

“If exploited, this vulnerability makes it possible for remote attackers to inject malicious code,” it warned in the quick advisory.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The seller suggested prospects to enhance their equipment to:

  • QTS 5..1.2234 develop 20221201 and later
  • QuTS hero h5..1.2248 create 20221215 and later on

Much more depth can be uncovered in the National Vulnerability Databases (NVD) entry for the flaw, which shows a CVSS score of 9.8 and describes it as an SQL injection vulnerability.

Prospects would be smart to comply with QNAP’s information, given that its units have develop into a common concentrate on for threat actors about the latest many years.

In actuality, its NAS gadgets had been specific by the Deadbolt ransomware variant through most of 2022. In the course of that campaign, it is considered the team exploited a zero-day vulnerability in QNAP firmware to encrypt and extort buyers all around the world. It also experimented with to hold QNAP to ransom by charging the vendor over $1m for the learn decryption essential and additional aspects on the bug.

QNAP buyers are usually compact businesses, faculties, property business office people and identical whose security and patching could not generally abide by ideal methods.

Consumers can down load the update from the QNAP web site, by using its Down load Centre, or log-in to their QTS or QuTS hero as an administrator, pay a visit to Manage Panel > Process > Firmware and then “Check for Update” beneath “Live Update.”


Some parts of this post are sourced from:
www.infosecurity-magazine.com

Previous Post: «qnap fixes critical vulnerability in nas devices with latest security QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates
Next Post: Two US Doctors Convicted of $30m Medicare Fraud Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.