QNAP has taken action to address two critical security vulnerabilities that threatened its operating system, potentially allowing arbitrary code execution. The vulnerabilities, identified as CVE-2023-23368 and CVE-2023-23369, posed significant risks to QNAP’s QTS, QuTS hero, QuTScloud, Multimedia Console, and Media Streaming add-on.
Furthermore, the first flaw, CVE-2023-23368, had a CVSS score of 9.8 and involved a command injection bug that could enable remote attackers to execute commands via a network. These issues were found in various versions of the QNAP software, and the company promptly released updates to patch these vulnerabilities.
The impact of the first vulnerability, CVE-2023-23368, spanned versions such as QTS 5.0.x and QuTS hero h5.0.x, with corresponding fixes released for each. The second vulnerability, CVE-2023-23369, was rated with a CVSS score of 9.0 and presented another command injection flaw affecting QTS, Multimedia Console, and Media Streaming add-on. Affected software versions included QTS 5.1.x and QTS 4.3.x, among others. Users of these versions were strongly encouraged to update to the latest available versions to enhance their cybersecurity and safeguard their NAS devices.
QNAP’s quick response to these vulnerabilities is particularly critical, considering the history of ransomware attacks targeting NAS devices. To mitigate potential threats and maintain the security of their network-attached storage systems, users are advised to promptly apply the security updates provided by QNAP. This development also follows QNAP’s efforts to combat widespread brute-force attacks targeting internet-exposed NAS devices with weak passwords, emphasizing the need for robust security measures in protecting these devices from malicious actors.