{"id":33462,"date":"2024-03-12T06:24:13","date_gmt":"2024-03-12T05:24:13","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=33462"},"modified":"2024-03-12T06:24:13","modified_gmt":"2024-03-12T05:24:13","slug":"critical-vulnerability-cve-2024-21899-allows-qnap-nas-access-without-authentication","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/03\/12\/critical-vulnerability-cve-2024-21899-allows-qnap-nas-access-without-authentication\/","title":{"rendered":"Critical vulnerability CVE-2024-21899 allows QNAP NAS access without authentication"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/03\/10\/kritische-schwachstelle-cve-2024-21899-ermglicht-qnap-nas-zugriff-ohne-authentifizierung\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Owners of QNAP NAS drives are at risk from the critical vulnerability CVE-2024-21899. This allows access to devices without requiring authentication via username and password. The manufacturer has released security updates to its vulnerable operating systems to close the vulnerability.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg06.met.vgwort.de\/na\/01a6f08d296c42979fd6037eee8caff9\" alt=\"\" width=\"1\" height=\"1\" \/>I came across a tweet with the content \"<em>CVE-2024-21899 (CVSS 9.8): Critical QNAP Flaw Opens Door to Hackers This bug means attackers can slither into your NAS without needing a username or password.<\/em>\" brought the issue to my attention. According to the tweet, more than 3 million devices have been found that have the vulnerability and are accessible via the Internet. The colleagues from Bleeping Computer have published <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/qnap-warns-of-critical-auth-bypass-flaw-in-its-nas-devices\/\" target=\"_blank\" rel=\"noopener\">this article<\/a> on the subject. QNAP has published the security advisory <a href=\"https:\/\/www.qnap.com\/de-de\/security-advisory\/qsa-24-09\" target=\"_blank\" rel=\"noopener\">qsa-24-09: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, and myQNAPcloud<\/a> on March 9, 2024. In the products listed below:<\/p>\n<blockquote><p>QTS 5.1.x, 4.5.x; QuTS hero h5.1.x, h4.5.x; QuTScloud c5.x; myQNAPcloud 1.0.x<\/p><\/blockquote>\n<p>there are the critical vulnerabilities:<\/p>\n<ul>\n<li>CVE-2024-21899: The vulnerability could allow users to compromise the security of the system over a network during authentication.<\/li>\n<li>CVE-2024-21900: The injection vulnerability allows authenticated users to execute commands over a network.<\/li>\n<li>CVE-2024-21901: The SQL injection vulnerability could allow authenticated administrators to inject malicious code over a network.<\/li>\n<\/ul>\n<p>The vulnerabilities are fixed in the following software versions:<\/p>\n<ul>\n<li>QTS 5.1.x: QTS 5.1.3.2578 build 20231110 and later<\/li>\n<li>QTS 4.5.x: QTS 4.5.4.2627 build 20231225 and later<\/li>\n<li>QuTS hero h5.1.x: QuTS hero h5.1.3.2578 build 20231110 and later<\/li>\n<li>QuTS hero h4.5.x: QuTS hero h4.5.4.2626 build 20231225 and later<\/li>\n<li>QuTScloud c5.x: QuTScloud c5.1.5.2651 and later<\/li>\n<li>myQNAPcloud 1.0.x: myQNAPcloud 1.0.52 (2023\/11\/24) and later<\/li>\n<\/ul>\n<p>Owners of of these QNAP products should install the software versions mentioned immediately in order to eliminate the critical vulnerabilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Owners of QNAP NAS drives are at risk from the critical vulnerability CVE-2024-21899. This allows access to devices without requiring authentication via username and password. The manufacturer has released security updates to its vulnerable operating systems to close the vulnerability.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[448,580,1547,22],"tags":[701,949,69,195],"class_list":["post-33462","post","type-post","status-publish","format-standard","hentry","category-devices","category-security","category-software","category-update","tag-device","tag-qnap","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=33462"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33462\/revisions"}],"predecessor-version":[{"id":33463,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33462\/revisions\/33463"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=33462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=33462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=33462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}