Saturday, October 12, 2024
HomeCVE/vulnerabilityMultiple QNAP High-Severity Flaws Let Attackers Execute Remote Code

Multiple QNAP High-Severity Flaws Let Attackers Execute Remote Code

Published on

Malware protection

QNAP has released multiple security advisories for addressing several high, medium, and low-severity vulnerabilities in multiple products, including QTS, QuTS hero, Netatalk, Video Station, QuMagie, and QcalAgent. 

QNAP has also stated all the affected products and their versions and the steps to update each product. The CVEs for these vulnerabilities are as follows:

  • CVE-2023-45039 (Low – QTS and QuTS hero)
  • CVE-2023-45040 (Low – QTS and QuTS hero)
  • CVE-2023-45041 (Low – QTS and QuTS hero)
  • CVE-2023-45042 (Low – QTS and QuTS hero)
  • CVE-2023-45043 (Low – QTS and QuTS hero)
  • CVE-2023-45044 (Low – QTS and QuTS hero)
  • CVE-2022-43634 (High – Netatalk)
  • CVE-2023-41287 (High-Video Station)
  • CVE-2023-41288 (High-Video Station)
  • CVE-2023-47219 (Low – QuMagie)
  • CVE-2023-47559 (High – QuMagie)
  • CVE-2023-47560 (High – QuMagie)
  • CVE-2023-39294 (Medium – QTS and QuTS hero)
  • CVE-2023-39296 (High – QTS and QuTS hero) 
  • CVE-2023-41289 (Medium – QcalAgent)

QTS and QuTS hero Vulnerabilities

CVE-2023-45039, CVE-2023-45040, CVE-2023-45041, CVE-2023-45042, CVE-2023-45043, and CVE-2023-45044 were associated with buffer copy, which was due to the insufficient checking in size of the input.

- Advertisement - SIEM as a Service

Exploiting this vulnerability could allow authenticated administrators to execute code through a network.

Document
Free Webinar

Fastrack Compliance: The Path to ZERO-Vulnerability

Compounding the problem are zero-day vulnerabilities like the MOVEit SQLi, Zimbra XSS, and 300+ such vulnerabilities that get discovered each month. Delays in fixing these vulnerabilities lead to compliance issues, these delay can be minimized with a unique feature on AppTrana that helps you to get “Zero vulnerability report” within 72 hours.

The severity of this set of vulnerabilities has been given as low, according to the QNAP security advisory. However, CVE-2023-39294 and CVE-2023-39296 were given medium and high severity as per the security advisories.

CVE-2023-39294 was associated with OS command injection, which could allow authenticated administrators to execute commands through a network.

At the same time, CVE-2023-39296 was related to prototype pollution that could allow remote users to override existing attributes with incompatible types, resulting in the system’s crashing.

QuMagie Vulnerabilities

CVE-2023-47219 was a low-severity vulnerability associated with SQL injection that could allow an authenticated threat actor to inject malicious code via a network. CVE-2023-47559 and CVE-2023-47560 were a set of high-severity vulnerabilities linked to Cross-site scripting and OS command injection, respectively. 

Both of these vulnerabilities require the threat actor to be an authenticated user. Exploiting these vulnerabilities could result in either the injection of malicious code (CVE-2023-47559) or the execution of commands through a network (CVE-2023-47560).

Video Station Vulnerabilities

CVE-2023-41287 and CVE-2023-41288 were another set of vulnerabilities reported on a QNAP security advisory. CVE-2023-41287 was an SQL injection vulnerability, and CVE-2023-41288 was an OS command injection vulnerability.

These vulnerabilities were marked as high severity by QNAP. However, both vulnerabilities affect Video Station version 5.7.x and have been fixed in Video Station 5.7.2 and later versions.

Netatalk and QcalAgent

The Netatalk vulnerability has been given the CVE-2022-43634, and its severity is high. However, QNAP has not released any other details about this vulnerability or its category. However, according to the security advisory, this vulnerability affects the QTS 5.1.x version and has been fixed in QTS 5.1.3.2578 build 20231110 and later.

CVE-2023-41289 was another OS command injection vulnerability reported to be affecting QcalAgent. This vulnerability was given as a medium severity in the security advisory and mentioned to be affecting QcalAgent 1.1.x

All of the affected products have been fixed, and patches have been released. It is recommended for organizations that use these products to upgrade to the latest versions to prevent becoming prey for threat actors. 

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...