Security ID : QSA-22-16
Multiple Vulnerabilities in QTS, QuTS hero, and QuTScloud
Release date : May 6, 2022
CVE identifier : CVE-2021-44051 | CVE-2021-44052 | CVE-2021-44053 | CVE-2021-44054
Affected products: Certain QNAP NAS
Severity
Important
Status
Resolved
Summary
Multiple vulnerabilities have been reported to affect QTS, QuTS hero, and QuTScloud:
- CVE-2021-44051: Command injection vulnerability
- If exploited, this vulnerability allows remote attackers to run arbitrary commands.
- CVE-2021-44052: Improper link resolution before file access ("link following") vulnerability
- If exploited, this vulnerability allows remote attackers to traverse the file system to unintended locations and read or overwrite files.
- CVE-2021-44053: Cross-site scripting (XSS) vulnerability
- If exploited, this vulnerability allows remote attackers to inject malicious code.
- CVE-2021-44054: Open redirect vulnerability
- If exploited, this vulnerability allows attackers to redirect users to an untrusted page that contains malware.
We have already fixed the vulnerabilities in the following versions of QTS, QuTS hero, and QuTScloud:
- QTS 5.0.0.1986 build 20220324 and later
- QTS 4.5.4.1991 build 20220329 and later
- QTS 4.3.6.1965 build 20220302 and later
- QTS 4.3.4.1976 build 20220303 and later
- QTS 4.3.3.1945 build 20220303 and later
- QTS 4.2.6 build 20220304 and later
- QuTS hero h5.0.0.1986 build 20220324 and later
- QuTS hero h4.5.4.1971 build 20220310 and later
- QuTScloud c5.0.1.1998 and later
Recommendation
To fix the vulnerabilities, we recommend updating your QNAP operating system to one of the above versions or later.
Updating QTS, QuTS hero, or QuTScloud
- Log on to QTS, QuTS hero, or QuTScloud as administrator.
- Go to Control Panel > System > Firmware Update.
- Under Live Update, click Check for Update.
QTS, QuTS hero, or QuTScloud downloads and installs the latest available update.
Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.
Acknowledgements: Enio Pena Navarro and Michael Messner from Siemens Energy AG
Revision History:
V1.0 (May 6, 2022) - Published