[Important Security Notice] Fake Qfinder Pro Websites Detected. Learn more >

Security ID : QSA-26-16

Local Privilege Escalation Vulnerability in Linux Kernel (Copy Fail)


  • Release date : May 2, 2026

  • CVE identifier : CVE-2026-31431

  • Not affected products:
    All QNAP x86-based NAS
    All QuTS hero NAS models
    QNAP ARM-based NAS running QTS 4.x (these utilize older kernel versions).
    QNAP ARM-based NAS running kernel versions other than 5.10.

  • Affected products:
    QTS on specific QNAP ARM64 NAS models running Kernel 5.10

Severity

Moderate

Status

Investigating


Summary
A local privilege escalation vulnerability, commonly known as "Copy Fail", has been reported to affect the Linux kernel. If exploited, this vulnerability could allow an authenticated, non-administrator user with code execution capabilities to obtain elevated system privileges.

This vulnerability specifically affects systems that meet both of the following criteria:

  1. Architecture: ARM64 .
  2. Kernel Version: Linux Kernel 5.10.

QNAP is currently investigating the issue and developing security updates. This advisory will be updated as soon as fixes are available.

Affected Products
The following operating system versions are affected:

  • QTS on specific QNAP ARM64 NAS models running Kernel 5.10 

To verify your NAS architecture and kernel version, please log in to QTS or check the technical specifications for your model at: https://www.qnap.com/go/release-notes/kernel

Products Not Affected

The following products and configurations are not impacted by this vulnerability:

  • All QNAP x86-based NAS 
  • All QuTS hero NAS models 
  • QNAP ARM-based NAS running QTS 4.x (these utilize older kernel versions).
  • QNAP ARM-based NAS running kernel versions other than 5.10.

Recommendation
Currently, no official mitigation is available for this vulnerability. We strongly recommend users install security updates immediately upon release.

To reduce exposure on potentially affected devices, QNAP recommends the following security measures:

  • Restrict Access: Avoid granting shell access or terminal permissions to non-administrator users.
  • Container Security: Limit container deployments to trusted images and restrict environment access within Container Station.
  • Disable Unused Services: Disable the Web Server (default port 80) and other non-essential applications if not in use.
  • Network Protection: Ensure the NAS is not directly exposed to the internet. Use QuFirewall or external network firewalls to restrict access.

Revision History: V1.0 (May 2, 2026) - Published

Choose specification

      Show more Less
      Choose Your Country or Region
      open menu
      back to top