Security ID : QSA-24-28

Vulnerabilities in QTS and QuTS hero


  • Release date : September 7, 2024

  • CVE identifier : CVE-2024-32771 | CVE-2023-39298 | CVE-2024-53691

  • Affected products: QTS 5.1.x, QuTS hero h5.1.x

Severity

Moderate

Status

Resolved


Summary

Multiple vulnerabilities have been reported to affect certain QNAP operating system versions:

  • CVE-2024-32771: If exploited, the improper restriction of excessive authentication attempts vulnerability could allow attackers to use bruce force attacks to gain privileged access.
  • CVE-2023-39298: If exploited, the missing authorization vulnerability could allow local attackers who have gained user access to access data or perform actions without the proper privileges.
  • CVE-2024-53691: If exploited, the link following vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.

  

We have already fixed the vulnerabilities in the following versions:

Affected Product Fixed Version
QTS 5.1.x QTS 5.2.0.2802 build 20240620 and later
QuTS hero h5.1.x QuTS hero h5.2.0.2802 build 20240620 and later

Recommendation

To secure your device, we recommend regularly updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.

Updating QTS or QuTS hero

  1. Log in to QTS or QuTS hero as an administrator.
  2. Go to Control Panel > System > Firmware Update.
  3. Under Live Update, click Check for Update.
    The system downloads and installs the latest available update.

Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.

  

Attachment

Acknowledgements:
chumen77
c411e

Revision History:
V1.0 (September 07, 2024) - Published
V1.0 (November 28, 2024) - Update CVE-2024-53691

Kies specificatie

      Toon meer Minder

      Deze website in andere landen/regio's:

      open menu
      back to top