NAS vendor QNAP Systems has urgently released patches for no fewer than 24 vulnerabilities across its product range, including two high-severity flaws that could enable command execution.
Despite the severity of these vulnerabilities, QNAP has not reported any cases of these bugs being exploited in the wild. The Taiwan-based company’s move is more of a proactive measure against potentially highly damaging exploits.
According to Safety week. The most concerning vulnerabilities, also referred to as CVE-2023-45025 and CVE-2023-39297, are command injection flaws in the operating system. These bugs are present in QTS versions 5.1.x and 4.5.x, QuTS hero versions h5.1.x and h4.5.x, and QuTScloud version 5.x. The first of these can be manipulated by users to execute commands over a network under certain system configurations, while the second requires authentication for successful exploitation.
QNAP has also released patches for two additional vulnerabilities, CVE-2023-47567 and CVE-2023-47568. These remotely exploitable flaws are present in QTS, QuTS hero, and QuTScloud and require administrator authentication for successful exploitation. The former is an OS command injection, while the latter is a SQL injection vulnerability.
All four of these security flaws have been fixed in the latest QTS, QuTS hero and QuTScloud versions. Another high-severity vulnerability, CVE-2023-47564, affecting Qsync Central versions 4.4.x and 4.3.x, has also been patched. This bug allows authenticated users to read or modify critical resources over a network.
In addition to these high-severity flaws, QNAP has patched multiple moderate vulnerabilities that could lead to code execution, DoS attacks, command execution, restriction bypassing, sensitive data leakage, and code injection.
For more detailed information about these vulnerabilities, users are advised to visit QNAP’s security advisories page.