Qnap Security Advisory Bulletin ID: QSA-21-28
Concerning command injection vulnerability in QTS NAS OS
This is a Press Release edited by StorageNewsletter.com on June 25, 2021 at 2:31 pmQNAP Systems, Inc. had published security enhancement against security vulnerabilities that could affect specific versions of company’s products.
Use the following information and solutions to correct the security issues and vulnerabilities.
Command injection Vulnerability in QTS
Release date: June 24, 2021
Security ID: QSA-21-28
Severity rating: High
CVE identifier: CVE-2021-28800
Affected products: Certain QNAP NAS
Summary
A command injection vulnerability has been reported to affect QNAP NAS running legacy versions of QTS. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application.
The company have already fixed this vulnerability in following versions:
-
QTS 4.3.6.1663 Build 20210504 and later
-
QTS 4.3.3.1624 Build 20210416 and later
The latest versions of QTS, QuTS hero, and QuTScloud are not affected.
Recommendation
To secure your device, we strongly recommend updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.
Updating QTS or QuTS hero
-
Log on to QTS or QuTS hero as administrator.
-
Go to Control Panel> System> Firmware Update.
-
Under Live Update, click Check for Update.
QTS or QuTS hero downloads and installs the latest available update.
Tip: You can also download the update from the company’s website. Go to Support> Download Center and then perform a manual update for your specific device.
Acknowledgements: CFF of Topsec Alpha Team
Revision History: V1.0 (June 24, 2021) – Published