0 %

Critical PHP Vulnerability Exposes QNAP NAS Devices to Remote Attacks

June 23, 2022
QNAP NAS PHP Vulnerability

QNAP, Taiwanese manufacturer of network-attached storage space (NAS) tools, on Wednesday claimed it remains in the procedure of taking care of a vital three-year-old PHP susceptability that can be abused to accomplish remote code implementation.

” A susceptability has actually been reported to influence PHP variations 7.1.x listed below 7.1.33, 7.2.x listed below 7.2.24, as well as 7.3.x listed below 7.3.11 with inappropriate nginx config,” the equipment supplier said in an advisory. “If made use of, the susceptability enables assailants to acquire remote code implementation.”


The susceptability, tracked as CVE-2019-11043, is ranked 9.8 out of 10 for intensity on the CVSS susceptability racking up system. That claimed, it’s called for that Nginx as well as php-fpm are running in devices making use of the complying with QNAP os variations –

  • QTS 5.0.x as well as later on
  • QTS 4.5.x as well as later on
  • QuTS hero h5.0.x as well as later on
  • QuTS hero h4.5.x as well as later on
  • QuTScloud c5.0.x as well as later on

” As QTS, QuTS hero or QuTScloud does not have actually nginx mounted by default, QNAP NAS are not influenced by this susceptability in the default state,” the business claimed, including it had actually currently reduced the concern in OS variations QTS construct 20220515 as well as QuTS hero h5.0.0.2069 construct 20220614.

The sharp comes a week after QNAP revealed that it’s “extensively examining” yet one more wave of DeadBolt ransomware assaults targeting QNAP NAS tools running obsolete variations of QTS 4.x.


Besides prompting clients to update to the latest variation of QTS or QuTS hero running systems, it’s likewise suggesting that the tools are not subjected to the web.

Furthermore, QNAP has actually encouraged clients that can not find the ransom money note after updating the firmware to enter the received DeadBolt decryption key to connect to QNAP Support for help.

” If your NAS has actually currently been jeopardized, take the screenshot of the ransom money note to maintain the bitcoin address, after that update to the current firmware variation as well as the integrated Malware Eliminator application will immediately quarantine the ransom money note which pirates the login web page,” it claimed.

Posted in SecurityTags:
Write a comment