Security ID : QSA-24-31
Vulnerability in OpenSSH
Release date : July 2, 2024
CVE identifier : CVE-2024-6387
Not affected products: QTS 5.1.x, 4.5.x; QuTS hero h5.1.x, h4.5.x
Affected products: QTS 5.2.0 RC, QuTS hero h5.2.0 RC
Severity
Important
Status
Resolved
Summary
A remote code execution (RCE) vulnerability in OpenSSH has been reported to affect QTS 5.2.0 Release Candidate and QuTS hero h5.2.0 Release Candidate.
QTS 5.1.x, QTS 4.5.x, QuTS hero h5.1.x, QuTS hero h4.5.x, and QuTScloud c5.x are not affected.
We have already fixed the vulnerability in the following versions:
Affected Product | Fixed Version |
QTS 5.2.0 RC | QTS 5.2.0.2823 build 20240711 and later |
QuTS hero h5.2.0 RC | QuTS hero h5.2.0.2823 build 20240711 and later |
Recommendation
To secure your device, we recommend regularly updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.
Updating QTS or QuTS hero
- Log in to QTS or QuTS hero as an administrator.
- Go to Control Panel > System > Firmware Update.
- Under Live Update, click Check for Update.
The system downloads and installs the latest available update.
Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.
Revision History:
V1.0 (July 2, 2024) - Published
V1.1 (November 10, 2024) - Update fixed versions