QNAP Network Attached Storage (NAS) users can't seem to get a break. La société vient de publier un avis de sécurité, avertissant les utilisateurs de corriger (s'ouvre dans un nouvel onglet) leurs points de terminaison immédiatement, pour correger une faille qui permettait aux acteurs potentiels de la menace d'exécuter du code sur les appareils , from distance.
The flaw is in PHP, it was said, and can be found on these devices: QTS 5.0.x and later, QTS 4.5.x and later, QuTS hero h5.0.x and later, QuTS hero h4.5.x and later, and QuTScloud c5.0. XNUMX.x and later.
Users are recommended to update to QTS version 126.96.36.1994 build 20220515 and later, and QuTS hero h188.8.131.529 build 20220614 and later.
The failure is not exactly new, the company clarified. It's been known for about three years, but apparently it wasn't a viable option to exploit until now.
QNAP seems to withstand an endless barrage of cyberattacks. Lately, it seems like not a week can go by without the company fixing a high-severity vulnerability that puts its customers at immense risk.
Just this week, it was reported that users of QNAP NAS drives (opens in a new tab) were attacked again by ech0raix ransomware threat actors, the same group that targeted these devices in December of last year.
Additionally, earlier this year, Deadbolt threat actors left many NAS devices (opens in a new tab) encrypted.
A year ago, the company had to release a patch to address the cryptomining issue, as many threat actors were taking advantage of vulnerable NAS devices, installing cryptocurrency miners on them, for their own personal gain.
While cryptominers don't necessarily harm the target endpoint, they take up most of the computing power, leaving the device almost useless for anything else until removed.
In addition to ech0raix and Deadbolt, QNAP has also been targeted by Qlocker.
Via: Tom's Hardware (Opens in a new tab)