What are you looking for ?
Advertise with us
RAIDON

Qnap Security Advisory Bulletin ID: QSA-24-48, QSA-24-49, QSA-24-50

Concerning resolved vulnerabilities in Qsync Central, QTS and QuTS hero NAS OSs, and License Center

Qnap Systems, Inc. had published security enhancement against security vulnerabilities that could affect specific versions of Qnap products.

Use the following information and solutions to correct the security issues and vulnerabilities.

This advisory includes following:

Vulnerability in Qsync Central
Security ID: QSA-24-48
Release date: December 7, 2024
CVE identifier: CVE-2024-50404
Severity: Moderate
Status: Resolved
Affected products: Qsync Central 4.4.x

Summary
A link following vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.

The company have already fixed the vulnerability in following version:

Affected Product

Fixed Version

Qsync Central 4.4.x

Qsync Central 4.4.0.16_20240819 (2024/08/19)

and later

Informations

 

Multiple Vulnerabilities in QTS and QuTS hero (PWN2OWN 2024)
Security ID: QSA-24-49
Release date: December 7, 2024
CVE identifier: CVE-2024-48859 | CVE-2024-48865 | CVE-2024-48866 | CVE-2024-48867 | CVE-2024-48868 | CVE-2024-50393 | CVE-2024-50402 | CVE-2024-50403
Severity: Important
Status: Resolved
Affected products: QTS 5.1.x, 5.2.x; QuTS hero h5.1.x, h5.2.x

Summary:
Multiple vulnerabilities have been reported to affect certain Qnap NAS OSs versions:

  • CVE-2024-48859: If exploited, the improper authentication vulnerability could allow remote attackers to compromise the security of the system.
  • CVE-2024-48865: If exploited, the improper certificate validation vulnerability could allow attackers with local network access to compromise the security of the system.
  • CVE-2024-48866: If exploited, the improper handling of URL encoding (hex encoding) vulnerability could allow remote attackers to cause the system to go into an unexpected state.
  • CVE-2024-48867, CVE-2024-48868: If exploited, the improper neutralization of CRLF sequences (‘CRLF injection’) vulnerabilities could allow remote attackers to modify application data.
  • CVE-2024-50393: If exploited, the command injection vulnerability could allow remote attackers to execute arbitrary commands.
  • CVE-2024-50402, CVE-2024-50403: If exploited, the use of externally-controlled format string vulnerabilities could allow remote attackers who have gained administrator access to obtain secret data or modify memory.

The company have already fixed the vulnerabilities in following versions:

Affected Product

Fixed Version

QTS 5.1.x

QTS 5.1.9.2954 build 20241120 and later

QTS 5.2.x

QTS 5.2.2.2950 build 20241114 and later

QuTS hero h5.1.x

QuTS hero h5.1.9.2954 build 20241120 and later

QuTS hero h5.2.x

QuTS hero h5.2.2.2952 build 20241116 and later

Informations

 

Vulnerability in License Center
Security ID: QSA-24-50
Release date: December 7, 2024
CVE identifier: CVE-2024-48863
Severity: Important
Status: Resolved
Affected products: License Center 1.9.x

Summary
A command injection vulnerability has been reported to affect License Center. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands.

The company have already fixed the vulnerability in following version:

Affected Product

Fixed Version

License Center 1.9.x

License Center 1.9.43 and later

informations
Questions regarding this issue
Articles_bottom
ExaGrid
AIC
ATTOtarget="_blank"
OPEN-E