[SECURITY ADVISORY] Relative Path Traversal Vulnerability in QTS and QuTS hero

Introduce yourself to us and other members here, or share your own product reviews, suggestions, and tips and tricks of using QNAP products.
Post Reply
User avatar
Toxic17
Ask me anything
Posts: 6469
Joined: Tue Jan 25, 2011 11:41 pm
Location: Planet Earth
Contact:

[SECURITY ADVISORY] Relative Path Traversal Vulnerability in QTS and QuTS hero

Post by Toxic17 »

  • Release date: May 21, 2021
  • Security ID: QSA-21-14
  • Severity: High
  • CVE identifier: CVE-2021-28798
  • Affected products: All QNAP NAS
  • Status: Resolved
Summary
A relative path traversal vulnerability has been reported to affect QNAP NAS running QTS and QuTS hero. If exploited, this vulnerability allows attackers to modify files that impact system integrity.

We have already fixed this vulnerability in the following versions:
  • QTS 4.5.2.1630 Build 20210406 and later
  • QTS 4.3.6.1663 Build 20210504 and later
  • QTS 4.3.3.1624 Build 20210416 and later
  • QuTS hero h4.5.2.1638 Build 20210414 and later
QNAP NAS running QTS 4.5.3 are not affected.

Recommendation
To secure your device, we strongly recommend regularly updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.

Updating QTS or QuTS hero
  1. Log on to QTS or QuTS hero as administrator.
  2. Go to Control Panel > System > Firmware Update.
  3. Under Live Update, click Check for Update.
    QTS or QuTS hero downloads and installs the latest available update.
Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.

Acknowledgements: ZUSO ART
Revision History: V1.0 (May 21, 2021) - Published
Post Reply

Return to “Users' Corner”