QNAP Systems, Inc. has identified multiple high-severity vulnerabilities in its operating systems, potentially allowing attackers to compromise systems and execute malicious activities.
These issues affect several versions of QNAP’s QTS and QuTS hero operating systems. Users are urged to update their devices immediately to mitigate security risks. Below is an overview of the identified vulnerabilities:
Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar
Affected Products and Fixed Versions
QNAP has released patches for the affected versions to resolve these vulnerabilities. Ensure your system runs one of the fixed versions listed below:
Affected Product | Fixed Version |
QTS 5.1.x | QTS 5.1.9.2954 build 20241120 and later |
QTS 5.2.x | QTS 5.2.2.2950 build 20241114 and later |
QuTS hero h5.1.x | QuTS hero h5.1.9.2954 build 20241120 and later |
QuTS hero h5.2.x | QuTS hero h5.2.2.2952 build 20241116 and later |
Recommendation for Mitigation
To safeguard your device, promptly update your operating system to the latest version. Follow these steps:
Proactively updating your system ensures protection against these high-severity threats. Regular firmware updates are essential for maintaining system security and stability.
Investigate Real-World Malicious Links,Malware & Phishing Attacks With ANY.RUN - Try for Free
In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field Communication…
In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored entities,…
Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with 86%…
Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites, with…
Cybersecurity firm Volexity has tracked a series of highly targeted attacks by suspected Russian threat…
Threat actors are increasingly leveraging Google Forms, the tech giant’s widely-used form and quiz-building tool,…