Los usuarios de almacenamiento conectado a la red (NAS) de QNAP no parecen tener un descanso. The company has just released a security advisory, warning users to patch (opens in a new tab) their endpoints immediately, to fix a flaw that allowed potential threat actors to execute code on devices , distanced himself.
The flaw is in PHP, it was said, and can be found on these devices: QTS 5.0.x and later, QTS 4.5.x and later, QuTS hero h5.0.x and later, QuTS hero h4.5.x and later, and QuTScloud c5.0. XNUMX.x and later.
Users are recommended to update to QTS version 220.127.116.114 build 20220515 and later, and QuTS hero h18.104.22.1689 build 20220614 and later.
The failure is not exactly new, the company clarified. It's been known for about three years, but apparently it wasn't a viable option to exploit until now.
QNAP seems to withstand an endless barrage of cyberattacks. Lately, it seems like not a week can go by without the company fixing a high-severity vulnerability that puts its customers at immense risk.
Just this week, it was reported that users of QNAP NAS drives (opens in a new tab) were attacked again by ech0raix ransomware threat actors, the same group that targeted these devices in December of last year.
Additionally, earlier this year, Deadbolt threat actors left many NAS devices (opens in a new tab) encrypted.
A year ago, the company had to release a patch to address the cryptomining issue, as many threat actors were taking advantage of vulnerable NAS devices, installing cryptocurrency miners on them, for their own personal gain.
While cryptominers don't necessarily harm the target endpoint, they take up most of the computing power, leaving the device almost useless for anything else until removed.
In addition to ech0raix and Deadbolt, QNAP has also been targeted by Qlocker.
Via: Tom's Hardware (opens in a new tab)