Monday, December 16, 2024
HomeCVE/vulnerabilityCritical PHP Flaws Allows Attackers to Execute Remote Code on QNAP NAS...

Critical PHP Flaws Allows Attackers to Execute Remote Code on QNAP NAS Devices

Published on

SIEM as a Service

QNAP released a security advisory detailing the critical PHP vulnerabilities that allow an attacker to Remote Code on QNAP NAS Devices.

According to the advisory, “A Vulnerability has been reported to affect PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24, and 7.3.x below 7.3.11 with improper nginx configuration. If exploited, the vulnerability allows attackers to gain remote code execution”.

The three-year-old flaw, tracked as (CVE-2019-11043), has a CVSS severity score of 9.8 and affects several PHP versions. For the vulnerability to be exploited, both Nginx and PHP-fpm must be running.

- Advertisement - SIEM as a Service

The Vulnerability Affects the Following QNAP Operating System Versions:

  • QTS 5.0.x and later
  • QTS 4.5.x and later
  • QuTS hero h5.0.x and later
  • QuTS hero h4.5.x and later
  • QuTScloud c5.0.x and later

Only PHP installations with improper Nginx configurations are affected by this flaw. Moreover, both Nginx and PHP-fpm must be installed and running on the NAS device for the vulnerability to be leveraged.

The company noted that QTS, QuTS hero or QuTScloud does not have Nginx installed by default; QNAP NAS is not affected by this vulnerability in the default state.

Patch Available

The patched OS versions include:

  • QTS 5.0.1.2034 build 20220515 and later
  • QuTS hero h5.0.0.2069 build 20220614 and later

QNAP inform the customers who cannot locate the ransom note after upgrading the firmware to enter the received DeadBolt decryption key to reach out to QNAP Support for assistance

On a regular basis, it is recommended to regularly update your system to the latest version to benefit from vulnerability fixes. Customers can check the product support status to observe the recent updates available for their NAS model.

QNAP customers who would like to update their NAS devices to the latest firmware automatically need to log on to QTS, QuTS hero, or QuTScloud as administrator and click the “Check for Update” button under Control Panel > System > Firmware Update.

The customers can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device. Notably, this warning comes a week after QNAP revealed that it’s thoroughly investigating one more wave of ‘DeadBolt ransomware’ attacks targeting QNAP NAS devices running outdated versions of QTS 4.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

The Rise of AI-Generated Professional Headshots

It’s clear that a person’s reputation is increasingly influenced by their online presence, which...

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in...

Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in...

Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used...