QNAP calls on users to update NAS devices immediately
QNAP network-attached storage (NAS) users just can’t seem to catch a break. The company has just issued a security advisory, warning users to patch (opens in new tab) To fix a flaw that allows potential threat actors to execute code on devices remotely.
The flaw is found in PHP, it was said, and can be found in these tools: QTS 5.0.x and later, QTS 4.5.x and later, QTS Hero h5.0.x and later, QTS Hero h4.5.x and later, and QTSCloud c5.0.x and later.
Users are advised to patch QTS 5.0.1.2034 build 20220515 and later as well as QTS Hero H5.0.0.2069 build 20220614 and later.
The defect is not entirely new, the company further clarified. This was known for about three years, but apparently, until now was not a viable option to exploit.
QNAP appears to be facing an everlasting barrage of cyber attacks. Lately, it seems that a week cannot go by without the company fixing some highly-critical vulnerability that has put its customers at extreme risk.
Just this week it was said that QNAP NAS drives (opens in new tab) Users were again attacked by ech0raix ransomware threat actors, the same group that targeted these devices in December last year.
Also, earlier this year, deadbolt threat actors abandoned several NAS devices (opens in new tab) Code given.
A year ago, the company had to issue a patch to address the problem of cryptomining, as several threat actors were taking advantage of vulnerable NAS devices for their personal gain, installing cryptocurrency miners on them.
While cryptominers don’t necessarily hurt the target endpoint, they do take up most of the computing power, leaving the device virtually unusable for anything else, until it’s removed.
In addition to Ech0raix and Deadbolt, QNAP was also seen targeted by Qlocker.
Via: Tom’s Hardware (opens in new tab)