Security ID : QSA-24-26
Vulnerability in Legacy Versions of QTS
Release date : September 7, 2024
CVE identifier : CVE-2023-39300
Not affected products: QTS 5.x, 4.5.x; QuTS hero; QuTScloud
Affected products: QTS 4.3.x, 4.2.x
Severity
Moderate
Status
Resolved
Summary
An OS command injection vulnerability has been reported to affect legacy versions of QTS. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands on the operating system through an application's input.
We have already fixed the vulnerability in the following versions:
Affected Product | Fixed Version |
QTS 4.3.6 | QTS 4.3.6.2805 build 20240619 and later |
QTS 4.3.4 | QTS 4.3.4.2814 build 20240618 and later |
QTS 4.3.3 | QTS 4.3.3.2784 build 20240619 and later |
QTS 4.2.6 | QTS 4.2.6 build 20240618 and later |
Recommendation
To secure your device, we recommend regularly updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.
Updating QTS
- Log in to QTS as an administrator.
- Go to Control Panel > System > Firmware Update.
- Under Live Update, click Check for Update.
The system downloads and installs the latest available update.
Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.
Attachment
Acknowledgements: Arseniy Sharoglazov
Revision History:
V1.0 (September 07, 2024) - Published