Security ID : QSA-24-02
Multiple Vulnerabilities in QTS, QuTS hero, and QuTScloud
Release date : February 3, 2024
CVE identifier : CVE-2023-45026 | CVE-2023-45027 | CVE-2023-45028
Affected products: QTS 5.1.x, QuTS hero h5.1.x, QuTScloud c5.x
Severity
Moderate
Status
Resolved
Summary
Multiple vulnerabilities have been reported to affect several QNAP operating system versions:
- CVE-2023-45026 and CVE-2023-45027: If exploited, the path traversal vulnerabilities could allow remote attackers to read the contents of sensitive data.
- CVE-2023-45028: If exploited, the uncontrolled resource consumption vulnerability could allow remote attackers who have gained administrator access to launch a denial-of-service (DoS) attack.
We have already fixed the vulnerabilities in the following versions:
Affected Product | Fixed Version |
QTS 5.1.x | QTS 5.1.5.2645 build 20240116 and later |
QuTS hero h5.1.x | QuTS hero h5.1.5.2647 build 20240118 and later |
QuTScloud c5.x | QuTScloud c5.1.5.2651 and later |
Recommendation
To secure your device, we recommend regularly updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.
Updating QTS, QuTS hero, or QuTScloud
- Log in to QTS, QuTS hero, or QuTScloud as an administrator.
- Go to Control Panel > System > Firmware Update.
- Under Live Update, click Check for Update.
The system downloads and installs the latest available update.
Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.
Attachment
Acknowledgements: Jiaxu Zhao && Bingwei Peng
Revision History:
V1.0 (February 3, 2024) - Published