QNAP Releases Patches for Critical Vulnerabilities -CVE-2024-32766 & CVE-2024-32764

QNAP Releases Patches for Critical Vulnerabilities -CVE-2024-32766 & CVE-2024-32764


QNAP,  has issued a security warning with an urgent security advisory to its users concerning multiple severe vulnerabilities across its suite of NAS software products. These flaws, if exploited, could enable attackers to perform unauthorized actions such as bypassing authentication mechanisms and executing commands remotely.

The first two vulnerabilities tracked as CVE-2024-27124 with a CVSS score of 7.5 and CVE-2024-32766 with a CVSS score 10, are an OS command injection, a technique where attackers can send malicious commands to a vulnerable system, allowing them to run arbitrary code. This could lead to data theft, installation of malware, or a complete NAS takeover.

Advertisements

The third vulnerability tracked as CVE-2024-32764 with a CVSS score of 9.9 A dangerous flaw permitting unauthorized access to critical functions within the myQNAPcloud Link service.

QNAP urges all users to update their devices immediately to the following versions, which contain the necessary security patches:

  • QTS 5.1.3.2578 build 20231110 and later
  • QTS 4.5.4.2627 build 20231225 and later
  • QuTS hero h5.1.3.2578 build 20231110 and later
  • QuTS hero h4.5.4.2626 build 20231225 and later
  • QuTScloud c5.1.5.2651 and later
  • myQNAPcloud 1.0.52 (2023/11/24) and later
  • myQNAPcloud Link 2.4.51 and later

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.