QNAP NAS vulnerabilities not patched after almost a year

Published by

teaser

F-Secure reports that three vulnerabilities QNAP NAS systems have not been patched almost a year after they were reported. These vulnerabilities can provide an attacker full control over the device and this way steal data and passwords.



F-Secure found the vulnerabilities on the QNAP TVs-663 but also other devices of the manufacturer could very well be vulnerable reports myce:

An attacker is able to obtain admin privileges if the 3 vulnerabilities are exploited. With these privileges attackers can install malware, send spam or steal data and passwords.

The culprit is the automatic firmware update feature of the NAS. If an attacker sends a malicious update to the device, there is no check whether the firmware is really from QNAP. This allows an attacker to perform a man-in-the-middle attack and send a malcious firmware to the device to take control over it.

F-Secure reported the vulnerabilities in February last year to QNAP but the company still hasn’t patched them. So far only the TVS-663 is known to be affected, but because QNAP uses the same firmware on multiple models it’s very likely also other QNAP NAS devices are vulnerable.

At least 1.4 million TVS-663 devices are running the firmware, but possibly millions of other QNAP devices are just as vulnerable. QNAP is the 2nd largest NAS supplier of the world. F-Secure recommends QNAP owners running TQS firmware 4.2 (or later) to disable automatic updates and manually check for updates until the issue is fixed.

QNAP NAS vulnerabilities not patched after almost a year


Share this content
Twitter Facebook Reddit WhatsApp Email Print