安全ID : QSA-24-26
Vulnerability in Legacy Versions of QTS
发布日期 : September 7, 2024
通用漏洞披露 : CVE-2023-39300
未受影响产品: QTS 5.x, 4.5.x; QuTS hero; QuTScloud
受影响产品: QTS 4.3.x, 4.2.x
严重程度
Moderate
状态
已解决
Summary
An OS command injection vulnerability has been reported to affect legacy versions of QTS. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands on the operating system through an application's input.
We have already fixed the vulnerability in the following versions:
Affected Product | Fixed Version |
QTS 4.3.6 | QTS 4.3.6.2805 build 20240619 and later |
QTS 4.3.4 | QTS 4.3.4.2814 build 20240618 and later |
QTS 4.3.3 | QTS 4.3.3.2784 build 20240619 and later |
QTS 4.2.6 | QTS 4.2.6 build 20240618 and later |
Recommendation
To secure your device, we recommend regularly updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.
Updating QTS
- Log in to QTS as an administrator.
- Go to Control Panel > System > Firmware Update.
- Under Live Update, click Check for Update.
The system downloads and installs the latest available update.
Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.
附件
致谢: Arseniy Sharoglazov
修订历史:
V1.0 (September 07, 2024) - Published