Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

QNAP Fixes High Severity QTS, QES, And QuTS Hero Vulnerabilities

QNAP Fixes High Severity QTS, QES, And QuTS Hero Vulnerabilities

QNAP has released security updates to fix multiple high severity security vulnerabilities impacting network-attached storage (NAS) devices running the QES, QTS, and QuTS hero operating systems.

In total, the NAS maker has patched six vulnerabilities affecting earlier versions of its FreeBSD, Linux, and 128-bit ZFS based OSs.

The command injection, cross-site scripting (XSS), and hard-coded password security bugs have been reported by TIM Security Red Team Research, Lodestone Security, and the CFF of Topsec Alpha Team.

Also Read: Key PDPA Amendments 2019/2020 You Should Know

XSS vulnerabilities fixed today could allow remote attackers to inject malicious code in vulnerable app versions following successful exploitation.

Attackers abusing the command injection bugs could also elevate privileges, execute arbitrary commands on the compromised device or app, or even take over the underlying operating system.

The list of vulnerabilities QNAP patched today includes:

  • CVE-2020-2503: Stored cross-site scripting QES vulnerability — enables remote attackers to inject malicious code in File Station.
  • CVE-2020-2504: Absolute path traversal QES vulnerability — enables attackers to traverse files in File Station.
  • CVE-2020-2505: QES vulnerability — allows attackers to gain sensitive information via generation of error messages.
  • CVE-2016-6903: Command injection QES vulnerability — enables remote attackers to run arbitrary commands in Ishell.
  • CVE-2020-2499: Hard-coded password QES vulnerability — enables attackers to log in with a hard-coded password.
  • CVE-2020-25847: Command injection (QTS and QuTS hero) vulnerability — enables attackers to execute arbitrary commands in compromised apps. 

QNAP says that they have already fixed these security issues in QES 2.1.1 Build 20201006 and later, QTS 4.5.1.1495 build 20201123 (and later), and QuTS hero h4.5.1.1491 build 20201119 (and later).

“To secure your device, we strongly recommend updating your system to the latest version to benefit from vulnerability fixes,” QNAP said in the advisories.

To see the latest updates available for your NAS devices, you can check the product support status.

To deploy the security updates published today by QNAP on your NAS device you have to follow this procedure:

  1. Log on to QES, QTS, or QuTS hero as administrator.
  2. Go to Control Panel > System > Firmware Update.
  3. Under Live Update, click Check for Update. QES, QTS, or QuTS hero downloads and installs the latest available update.

The update can also be downloaded and installed manually from the Support Download Center on QNAP’s website.

Earlier this month QNAP fixed another series of security issues affecting NAS devices running vulnerable versions of QTS and potentially leading to device takeover after successful exploitation.

NAS devices are frequently targeted by attackers attempting to steal sensitive documents or deploy malware payloads given that they are commonly used for backup and file sharing.

QNAP warned customers in October that some versions of the QTS OS are affected by the critical Windows ZeroLogon vulnerability if the NAS devices were configured as domain controllers.

Also Read: The 5 Benefits Of Outsourcing Data Protection Officer Service

QNAP also alerted customers in September of ongoing AgeLocker ransomware attacks targeting publicly exposed NAS devices by exploiting older Photo Station versions.

Qihoo 360’s Network Security Research Lab (360 Netlab) said in August that attackers were also scanning for vulnerable NAS devices trying to exploit a remote code execution (RCE) firmware vulnerability fixed more than three years ago, in July 2017.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us