Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2023-0013
Version:
1.0
Affected software:
QNAP - QTS 5.0.1
QNAP - QuTS hero h5.0.1
Type:
Remote Code Injection
CVE/CVSS:
CVE-2022-27596
QNAP - https://www.qnap.com/en/security-advisory/qsa-23-01
If exploited, this vulnerability could allow remote attackers to inject malicious code.
A vulnerability has been reported that affect QNAP devices running QTS 5.0.1 and QuTS hero h5.0.1. If exploited, this vulnerability could allow remote attackers to inject malicious code. QNAP has fixed this vulnerability in the following operating system versions:
The vendor did not mention if this vulnerability is exploited in the wild.
To secure your device, QNAP and the CCB recommend to regularly update your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.
Updating QTS or QuTS hero
You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.
Extra Precautions
QNAP NAS should not be directly connected to the internet. Use the myQNAPcloud Link feature provided by QNAP, or enable the VPN service, to limit your attack surface.
Monitor/Detect
The CCB recommends organisations to upscale monitoring and detection capabilities and to detect any related suspicious activity, ensuring a fast response in case of an intrusion.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
When applying patches to systems that have been vulnerable to an RCE exploit, a proactive threat assessment should be performed to verify no exploitation occurred in the time between a patch becoming available and being applied.
NVD - https://nvd.nist.gov/vuln/detail/CVE-2022-27596
QNAP Product Support Status - https://www.qnap.com/en/product/eol.php