Buffer Copy Vulnerability Affects QNAP Operating System Versions

CVE-2024-27130
8.8HIGH

Key Information

Vendor
QNAP
Status
Qts
Quts Hero
Vendor
CVE Published:
21 May 2024

Badges

😄 Trended👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

The vulnerabilities affecting QNAP operating system versions include an incorrect permission assignment for critical resource, a double free vulnerability, and a set of buffer overflow vulnerabilities. These could all be exploited by authenticated users to execute arbitrary code via a network. The CVE-2024-27130 vulnerability, in particular, is caused by the unsafe use of the 'strcpy' function in the No_Support_ACL function, and can be exploited when sharing media with external users by an attacker with a valid 'ssid' parameter. However, exploitation is made difficult by Address Space Layout Randomization (ASLR) in QTS 4.x and 5.x versions. Meanwhile, researchers have discovered 15 vulnerabilities in QNAP’s network attached storage (NAS) devices, and have released a proof-of-concept for one unauthenticated stack overflow vulnerability (CVE-2024-27130) that may be leveraged for remote code execution. NAS users are recommended to update to the latest versions of QTS and QuTS hero as soon as possible to mitigate potential threats.

Affected Version(s)

QTS < 5.1.7.2770 build 20240520

QuTS hero < h5.1.x

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • Vulnerability started trending.

  • Vulnerability published.

  • First article discovered by watchTowr Labs - Blog

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)4 News Article(s)

Credit

Aliz Hammond of watchTowr
.