QNAP network-attached storage (NAS) customers simply can’t appear to catch a break. The corporate has simply launched a safety advisory, warning customers to patch (opens in new tab) up their endpoints instantly, to repair a flaw that allowed potential risk actors to execute code on the gadgets, remotely.
The flaw is present in PHP, it was stated, and may be present in these gadgets: QTS 5.0.x and later, QTS 4.5.x and later, QuTS hero h5.0.x and later, QuTS hero h4.5.x and later, and QuTScloud c5.0.x and later.
Customers are suggested to patch to model QTS 22.214.171.1244 construct 20220515 and later, in addition to QuTS hero h126.96.36.1999 construct 20220614 and later.
The flaw isn’t precisely new, the corporate additional clarified. It was recognized for about three years, however apparently, wasn’t a viable possibility to take advantage of till now.
QNAP appears to be withstanding an eternal barrage of cyberattacks. These days, it appears that evidently per week can’t go by with out the corporate fixing some high-severity vulnerability that’s positioned its prospects at immense threat.
Simply this week it was stated that QNAP NAS drives (opens in new tab) customers have been below assault from the ech0raix ransomware risk actors once more, the identical group that focused these gadgets in December final 12 months.
Moreover, earlier this 12 months, Deadbolt risk actors left many NAS devices (opens in new tab) encrypted.
A 12 months in the past, the corporate has needed to launch a patch to handle the issue of cryptomining, as many risk actors have been profiting from susceptible NAS gadgets, putting in cryptocurrency miners on them, for their very own private profit.
Whereas cryptominers don’t essentially damage the goal endpoint, they do take up the vast majority of computing energy, leaving the gadget virtually unusable for the rest, till it’s eliminated.
Apart from ech0raix and Deadbolt, QNAP was additionally noticed focused by Qlocker.
By way of: Tom’s Hardware (opens in new tab)