Data center: Ashburn, VA

Telegram Chat : MBHH_x86

Email Us:

Mobile Hacker For Hire

QNAP NAS Devices Ripe for the Slaughter

Table of Contents

A critical security vulnerability in QNAP’s QTS operating system for network-attached storage (NAS) devices could allow cyberattackers to inject malicious code into devices remotely, with no authentication required.

According to researchers from security firm Censys, more than 30,000 hosts are running a vulnerable version of the QNAP-based system as of press time, meaning that approximately 98% of these devices could be attacked.

The issue (CVE-2022-27596) is a SQL injection problem that affects QNAP QTS devices running versions below, and QuTS Hero versions below h5.0.1.2248. It carries a score of 9.8 out of 10 on the CVSS vulnerability-severity scale.

In its advisory this week, QNAP said the bug has a low attack complexity, which, when combined with the popularity of QNAP NAS as a target for Deadbolt ransomware and other threats, could make for imminent exploitation in the wild. And unfortunately, according to Censys, it’s a target-rich environment out there.

“Censys has observed 67,415 hosts with indications of running a QNAP-based system; unfortunately, we could only obtain the version number from 30,520 hosts,” the firm explained in a blog post on Feb. 1. “We found that of the 30,520 hosts with a version, only 557 were running [patched versions], meaning 29,968 hosts could be affected by this vulnerability.”

To protect themselves, companies should upgrade their devices to QTS version and QuTS Hero h5.0.1.2248.

“If the exploit is published and weaponized, it could spell trouble to thousands of QNAP users,” Censys researchers warned. “Everyone must upgrade their QNAP devices immediately to be safe from future ransomware campaigns.”

Leave a Reply

Your email address will not be published. Required fields are marked *

error: Content is protected !!