安全ID : QSA-26-16
Local Privilege Escalation Vulnerability in Linux Kernel (Copy Fail)
发布日期 : May 2, 2026
通用漏洞披露 : CVE-2026-31431
未受影响产品:
All QNAP x86-based NAS
All QuTS hero NAS models
QNAP ARM-based NAS running QTS 4.x (these utilize older kernel versions).
QNAP ARM-based NAS running kernel versions other than 5.10.受影响产品:
QTS on specific QNAP ARM64 NAS models running Kernel 5.10
严重程度
Moderate
状态
Investigating
Summary
A local privilege escalation vulnerability, commonly known as "Copy Fail", has been reported to affect the Linux kernel. If exploited, this vulnerability could allow an authenticated, non-administrator user with code execution capabilities to obtain elevated system privileges.
This vulnerability specifically affects systems that meet both of the following criteria:
- Architecture: ARM64 .
- Kernel Version: Linux Kernel 5.10.
QNAP is currently investigating the issue and developing security updates. This advisory will be updated as soon as fixes are available.
Affected Products
The following operating system versions are affected:
- QTS on specific QNAP ARM64 NAS models running Kernel 5.10
To verify your NAS architecture and kernel version, please log in to QTS or check the technical specifications for your model at: https://www.qnap.com/go/release-notes/kernel
Products Not Affected
The following products and configurations are not impacted by this vulnerability:
- All QNAP x86-based NAS
- All QuTS hero NAS models
- QNAP ARM-based NAS running QTS 4.x (these utilize older kernel versions).
- QNAP ARM-based NAS running kernel versions other than 5.10.
Recommendation
Currently, no official mitigation is available for this vulnerability. We strongly recommend users install security updates immediately upon release.
To reduce exposure on potentially affected devices, QNAP recommends the following security measures:
- Restrict Access: Avoid granting shell access or terminal permissions to non-administrator users.
- Container Security: Limit container deployments to trusted images and restrict environment access within Container Station.
- Disable Unused Services: Disable the Web Server (default port 80) and other non-essential applications if not in use.
- Network Protection: Ensure the NAS is not directly exposed to the internet. Use QuFirewall or external network firewalls to restrict access.
修订历史: V1.0 (May 2, 2026) - Published