You are currently viewing QNAP Security Advisory<br>QSA-21-28 – Command Injection Vulnerability in QTS

QNAP Security Advisory
QSA-21-28 – Command Injection Vulnerability in QTS

  • Reading time:2 mins read

QSA-21-28 QNAP had published security enhancement against security vulnerabilities that could affect specific versions of QNAP products. Please use the following information and solutions to correct the security issues and vulnerabilities.

Command Injection Vulnerability in QTS

Release date: June 24, 2021
Security ID: QSA-21-28
Severity rating: High
CVE identifier: CVE-2021-28800
Affected products: Certain QNAP NAS

Summary

A command injection vulnerability has been reported to affect QNAP NAS running legacy versions of QTS.

If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application.

We have already fixed this vulnerability in the following versions:

  • QTS 4.3.6.1663 Build 20210504 and later
  • QTS 4.3.3.1624 Build 20210416 and later

The latest versions of QTS, QuTS hero, and QuTScloud are not affected.

Recommendation

To secure your device, we strongly recommend updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.

Updating QTS or QuTS hero

  1. Log on to QTS or QuTS hero as administrator.
  2. Go to Control Panel> System> Firmware Update.
  3. Under Live Update, click Check for Update.
    QTS or QuTS hero downloads and installs the latest available update.

Tip: You can also download the update from the QNAP website. Go to Support> Download Center and then perform a manual update for your specific device.

Acknowledgements: CFF of Topsec Alpha Team
Revision History: V1.0 (June 24, 2021) – Published If you have any questions regarding this issue, please contact us at https://www.qnap.com/go/support-ticket