QNAP has released patches to address medium-severity vulnerabilities impacting its QTS and QuTS hero operating systems, mitigating potential code execution risks on NAS appliances. These vulnerabilities, including incorrect permission assignments and buffer overflows, could be exploited by authenticated users to compromise the security of NAS devices. The patches, available in QTS 5.1.7.2770 build 20240520 and QuTS hero h5.1.7.2770 build 20240520, come after the discovery and reporting of the flaws by Aliz Hammond of watchTowr Labs.
The vulnerabilities, tracked by CVE identifiers, highlight security lapses that could lead to unauthorized access and data breaches. QNAP has acknowledged the discoveries and promptly released patches to address the identified vulnerabilities. However, the company is yet to resolve CVE-2024-27131, described as a case of “Log spoofing via x-forwarded-for,” which will be remediated in QTS 5.2.0.
Following the disclosure of these vulnerabilities by watchTowr Labs, QNAP has expressed regret over coordination issues and committed to enhancing security measures. The company aims to release fixes for high- or critical-severity flaws within 45 days and for medium-severity vulnerabilities within 90 days. Users are advised to update their QTS and QuTS hero systems to the latest versions promptly to safeguard against potential threats.