• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Qnap High Severity Flaws Plague Nas Systems

QNAP High-Severity Flaws Plague NAS Systems

You are here: Home / Latest Cyber Security Vulnerabilities / QNAP High-Severity Flaws Plague NAS Systems

The substantial-severity cross-website scripting flaws could allow remote-code injection on QNAP NAS methods.

QNAP Techniques is warning of superior-severity flaws that plague its major-advertising network hooked up storage (NAS) units. If exploited, the most extreme of the flaws could let attackers  to remotely get around NAS products.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Ultimate Suite 2021

Protect yourself against all threads using AVAST Ultimate Suite. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium. In addition it comes with AVAST's well-known VPN service SecureLineVPN. Therefore, it will be a security and privacy in one package.

Get AVAST Ultimate Suite with 65% discount certified seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


NAS units are techniques that consist of one particular or more really hard drives that are constantly connected to the internet – acting as a backup “hub” or storage device that outlets all vital files and media this sort of as photos, video clips and tunes. Over-all, QNAP on Monday issued patches for cross-web-site scripting (XSS) flaws tied to six CVEs.

4 of these vulnerabilities stem from an XSS issue that has an effect on before versions of QTS and QuTS hero. QTS is the running program for NAS programs, when the QuTS Hero is an working method that brings together the app-based QTS with a 128-bit ZFS file system to offer additional storage management.

Two of these XSS flaws (CVE-2020-2495 and CVE-2020-2496) could allow remote attackers to inject destructive code into File Station. File Station is a created-in QTS application that allows people to regulate files stored on their QNAP NAS units.

Another flaw (CVE-2020-2497) can empower remote attackers to inject malicious code in Process Connection Logs though the fourth flaw (CVE-2020-2498) makes it possible for attackers to remotely inject destructive code into the certificate configuration.

QNAP reported “we strongly recommend updating your process to the hottest version” of QTS and QuTS hero: QuTS hero h4.5.1.1472 build 20201031 and afterwards, QTS 4.5.1.1456 establish 20201015 and later, QTS 4.4.3.1354 develop 20200702 and afterwards, QTS 4.3.6.1333 develop 20200608 and later on, QTS 4.3.4.1368 build 20200703 and afterwards, QTS 4.3.3.1315 construct 20200611 and later and QTS 4.2.6 establish 20200611 and later on.

People can do so by logging on to the QTS or QuTS hero as an administrator, going to Regulate Panel > Procedure > Firmware Update and clicking Look at for Updating less than “Live Update.”

An additional substantial-severity XSS vulnerability (CVE-2020-2491) exists in the Image Station feature of QNAP NAS techniques, which enables distant picture administration. The flaw allows attackers to remotely inject destructive code.

According to QNAP, it has been preset in the next variations of the QTS running process: QTS 4.5.1 (Photo Station 6..12 and later) QTS 4.4.3 (Image Station 6..12 and afterwards) QTS 4.3.6 (Photograph Station 5.7.12 and later) QTS 4.3.4 (Photograph Station 5.7.13 and later) QTS 4.3.3 (Photograph Station 5.4.10 and later) and QTS 4.2.6 (Photo Station 5.2.11 and afterwards).

The remaining XSS flaw (CVE-2020-2493) exists in the Multimedia Console of QNAP NAS methods, and lets distant attackers to inject destructive code. The Multimedia Console element enables indexing, transcoding, thumbnail era and content material administration so people can control multimedia apps and expert services a lot more efficiently.

“We have already set this vulnerability in Multimedia Console 1.1.5 and afterwards,” said QNAP in its advisory.

QNAP Programs hardware are no strangers to staying attack targets. Last calendar year, attackers crafted malware specifically made to target NAS products. Also in July 2019, scientists highlighted an unusual Linux ransomware, referred to as QNAPCrypt, which targeted QNAP NAS servers. Scientists have also previously found multiple bugs in QNAP’s Q’Center Web Console while in 2014, a worm exploiting the Bash vulnerability in QNAP network hooked up storage devices was also uncovered.

Place Ransomware on the Operate: Save your spot for “What’s Subsequent for Ransomware,” a FREE Threatpost webinar on Dec. 16 at 2 p.m. ET. Find out what is coming in the ransomware planet and how to battle again. 

Get the newest from John (Austin) Merritt, Cyber Menace Intelligence Analyst at Electronic Shadows, and Israel Barak, CISO at Cybereason, on new sorts of attacks. Subjects will include the most perilous ransomware risk actors, their evolving TTPs and what your firm needs to do to get ahead of the next, unavoidable ransomware attack. Sign-up here for the Wed., Dec. 16 for this LIVE webinar.


Some areas of this write-up are sourced from:
threatpost.com

Previous Post: «Misconfigured Servers Contributed To Additional Than 200 Cloud Breaches Ransomware attacks target backup systems, compromising the company ‘insurance policy’
Next Post: Healthcare in Crisis: Diagnosing Cybersecurity Shortcomings in Unprecedented Times Healthcare In Crisis: Diagnosing Cybersecurity Shortcomings In Unprecedented Times»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.