QNAP fixes critical vulnerability in network monitoring products


Taiwanese network-attached storage (NAS) provider QNAP Systems on Friday announced patches for a critical vulnerability affecting some of its network surveillance products.

Tracked as CVE-2022-27588, the security hole could allow a remote attacker to execute arbitrary commands on vulnerable devices, the company says in its advisory.

QNAP says only VS-series NVR devices running QVR are affected and the issue has been resolved with the release of QVR 5.1.6 build 20220401. The manufacturer encourages all users to update their systems to the latest version.

Also this week, the company released information about patches released for a high-severity vulnerability in certain NAS devices running Photo Station.

Tracked as CVE-2021-44057, the “vulnerability allows attackers to compromise system security,” the company says. Photo Station versions 6.0.20 and later, 5.7.16 and later, and 5.4.13 and later resolve this issue.

QNAP also announced fixes for several high-severity vulnerabilities in QTS, QuTS hero, and QuTScloud, which could be remotely exploited to inject commands (CVE-2021-44051), read or overwrite files (CVE-2021-44052) , inject malicious code (CVE-2021-44053) or redirect users to an untrusted web page (CVE-2021-44054).

The company has released software updates to fix all these security flaws and encourages users to update their QNAP OS to the latest versions.

It is not uncommon for malicious actors to exploit vulnerabilities in QNAP products in their operations.

Related: QNAP extends security updates for some EOL devices

Related: QNAP Devices Targeted by New Wave of DeadBolt Ransomware Attacks

Related: QNAP Warns NAS Users of DeadBolt Ransomware Attacks

Ionut Argire is an international correspondent for SecurityWeek.

Previous columns by Ionut Arghire:


Comments are closed.