安全ID : QSA-24-26

Vulnerability in Legacy Versions of QTS


  • 发布日期 : September 7, 2024

  • 通用漏洞披露 : CVE-2023-39300

  • 未受影响产品: QTS 5.x, 4.5.x; QuTS hero; QuTScloud

  • 受影响产品: QTS 4.3.x, 4.2.x

严重程度

Moderate

状态

已解决


Summary

An OS command injection vulnerability has been reported to affect legacy versions of QTS. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands on the operating system through an application's input.

  

We have already fixed the vulnerability in the following versions:

Affected Product Fixed Version
QTS 4.3.6 QTS 4.3.6.2805 build 20240619 and later
QTS 4.3.4 QTS 4.3.4.2814 build 20240618 and later
QTS 4.3.3 QTS 4.3.3.2784 build 20240619 and later
QTS 4.2.6 QTS 4.2.6 build 20240618 and later

Recommendation

To secure your device, we recommend regularly updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.

Updating QTS

  1. Log in to QTS as an administrator.
  2. Go to Control Panel > System > Firmware Update.
  3. Under Live Update, click Check for Update.
    The system downloads and installs the latest available update.

Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.

  

附件

致谢: Arseniy Sharoglazov

修订历史:
V1.0 (September 07, 2024) - Published

选择规格

      显示更多 隐藏更多
      open menu
      back to top