QNAP NAS Exploits and Vulnerabilities Update


Today (October 30, 2024), a major cybersecurity concern emerged as QNAP devices, widely used for Network Attached Storage (NAS), were found vulnerable to remote code execution (RCE) due to unpatched exploits. Security researchers discovered that multiple critical flaws in QNAP’s QTS operating system remain unaddressed, with some being actively exploited. One of the key issues involves a zero-day vulnerability, CVE-2024-27130, which could allow attackers to take complete control of these NAS devices.


The Nature of the Exploits

The identified vulnerability lies in the improper use of the strcpy function within a component called No_Support_ACL in the QTS firmware. This function is called when handling file sharing requests through the system’s share.cgi script. If an attacker gains access to specific session parameters (like ssid from a shared link), they can craft malicious payloads to trigger buffer overflows, leading to unauthorized code execution.

While gaining this access requires some level of social engineering, many QNAP users inadvertently post their shared links online, which makes exploitation easier. Attackers can use search engines to locate these vulnerable URLs, exposing numerous systems to potential breaches.


Impact and Risks

If successfully exploited, this vulnerability allows remote attackers to create rogue accounts or gain administrative access, posing a serious risk to any organization or individual relying on QNAP NAS systems for data storage and sharing. It also increases the likelihood of ransomware attacks, where critical data could be encrypted or stolen.

Additionally, WatchTowr Labs, which uncovered these flaws, revealed that 15 vulnerabilities were initially reported—four have been patched, while others, including several high-severity issues like heap overflow and authentication bypasses, remain open. QNAP’s delay in providing comprehensive fixes has raised concerns among users and cybersecurity experts alike.


Related Threats and Solutions

Similar past incidents, such as buffer overflows in older versions of QNAP software, also highlighted the security risks with these systems. For example, vulnerabilities in theme management within Windows systems (CVE-2024-38030) show how code-related oversights can repeatedly lead to dangerous RCE scenarios.

To mitigate the risks, QNAP urges users to:

  1. Update Firmware: Install any available patches for QTS and related software.
  2. Enable Snapshots and Backup: Utilize QNAP’s snapshot feature to back up critical data.
  3. Restrict Access: Avoid sharing public links and implement robust access policies.
  4. Disconnect Affected Devices: If suspicious activity is detected, disconnect NAS devices from the network immediately.

Given the rapid evolution of exploits targeting NAS devices, QNAP users are encouraged to stay vigilant, regularly monitor QNAP’s advisories, and apply the latest security updates to prevent unauthorized access and ransomware attacks.

For more technical details on these vulnerabilities, you can refer to the research by WatchTowr Labs, and stay updated with QNAP’s security center and advisories.

Sources: BleepingComputer, QNAP Security Advisories, and recent research findings.



  • Related Posts

    Cisco Industrial Wireless Access Points Exposed to Critical Vulnerability


    A critical security vulnerability, cataloged as CVE-2024-20418, has been identified in Cisco’s Industrial Wireless Access Points, widely used in industrial settings for wireless connectivity. Disclosed on November 7,


    Read more

    Critical Vulnerability in Palo Alto Networks’ Expedition Tool Actively Exploited


    A critical security vulnerability, tracked as CVE-2024-5910, was recently discovered in Palo Alto Networks’ Expedition tool. This tool, which helps organizations manage and migrate firewall configurations, is widely


    Read more