QNAP Systems, Inc. has identified multiple high-severity vulnerabilities in its operating systems, potentially allowing attackers to compromise systems and execute malicious activities.
These issues affect several versions of QNAP’s QTS and QuTS hero operating systems. Users are urged to update their devices immediately to mitigate security risks. Below is an overview of the identified vulnerabilities:
Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar
Affected Products and Fixed Versions
QNAP has released patches for the affected versions to resolve these vulnerabilities. Ensure your system runs one of the fixed versions listed below:
Affected Product | Fixed Version |
QTS 5.1.x | QTS 5.1.9.2954 build 20241120 and later |
QTS 5.2.x | QTS 5.2.2.2950 build 20241114 and later |
QuTS hero h5.1.x | QuTS hero h5.1.9.2954 build 20241120 and later |
QuTS hero h5.2.x | QuTS hero h5.2.2.2952 build 20241116 and later |
Recommendation for Mitigation
To safeguard your device, promptly update your operating system to the latest version. Follow these steps:
Proactively updating your system ensures protection against these high-severity threats. Regular firmware updates are essential for maintaining system security and stability.
Investigate Real-World Malicious Links,Malware & Phishing Attacks With ANY.RUN - Try for Free
A recent security vulnerability in a widely used airline integration service has exposed millions of…
In a groundbreaking cybersecurity investigation, researchers identified several critical vulnerabilities in a target system, eventually…
A critical vulnerability in the Cacti performance monitoring framework tracked as CVE-2025-22604, has been disclosed,…
Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a previously…
A groundbreaking technique for exploiting Windows systems has emerged, combining the "Bring Your Own Vulnerable…
Microsoft has taken a significant step toward enhancing cybersecurity by introducing a new phishing attack…