Security ID : QSA-23-41
Vulnerabilities in QTS, QuTS hero, and QuTScloud
Release date : October 14, 2023
CVE identifier : CVE-2023-32970 | CVE-2023-32973
Affected products: QTS 5.1.x, 5.0.x, 4.5.x; QuTS hero h5.1.x, h5.0.x, h4.5.x; QuTScloud c5.x
Severity
Moderate
Status
Resolved
Summary
Two vulnerabilities have been reported to affect several QNAP operating system versions:
- CVE-2023-32970: If exploited, the null pointer dereference vulnerability could allow authenticated administrators to launch a denial-of-service (DoS) attack via a network.
- CVE-2023-32973: If exploited, the buffer copy without checking size of input vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerabilities in the following versions:
Affected Product | Fixed Version |
QTS 5.1.x | QTS 5.1.0.2444 build 20230629 and later |
QTS 5.0.x | QTS 5.0.1.2425 build 20230609 and later |
QTS 4.5.x | QTS 4.5.4.2467 build 20230718 and later |
QuTS hero h5.1.x | QuTS hero h5.1.0.2424 build 20230609 and later |
QuTS hero h5.0.x | QuTS hero h5.0.1.2515 build 20230907 and later |
QuTS hero h4.5.x | QuTS hero h4.5.4.2476 build 20230728 and later |
QuTScloud c5.x | QuTScloud c5.1.0.2498 and later |
Recommendation
To secure your device, we recommend regularly updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model. In addition, for online activities, it's recommended to access the web through secure and trusted networks.
Updating QTS, QuTS hero, or QuTScloud
- Log in to QTS, QuTS hero, or QuTScloud as an administrator.
- Go to Control Panel > System > Firmware Update.
- Under Live Update, click Check for Update.
The system downloads and installs the latest available update.
Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.
Attachment
Acknowledgements: Jiaxu Zhao && Bingwei Peng
Revision History:
V1.0 (October 14, 2023) - Published