Security News > 2021 > February > QNAP patches critical vulnerability in Surveillance Station NAS app
QNAP has addressed a critical security vulnerability in the Surveillance Station app that allows attackers to execute malicious code remotely on network-attached storage devices running the vulnerable software.
Surveillance Station is QNAP's network surveillance Video Management System, a software solution that can help users manage and monitor up to 12 IP cameras.
The critical security flaw patched today by QNAP is a stack-based buffer overflow vulnerability impacting QNAP NAS devices running Surveillance Station.
Surveillance Station 5.1.5.4.3 for ARM CPU NAS and x86 CPU NAS. Surveillance Station 5.1.5.3.3 for ARM CPU NAS and x86 CPU NAS. The company has also patched a medium severity cross-site scripting vulnerability affecting earlier versions of the Photo Station app used to upload images to QNAP NAS device, create albums, or view them remotely.
QNAP alerted customers in September 2020 of an AgeLocker ransomware campaign targeting Internet exposed NAS devices in attacks exploiting older and vulnerable Photo Station versions.
Qihoo 360's 360 Netlab also said in August that attackers were scanning for vulnerable NAS devices trying to exploit a remote code execution firmware vulnerability fixed over three years ago, in July 2017.
News URL
Related news
- Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection (source)
- BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products (source)
- BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356) (source)
- Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools (source)
- Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now (source)
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw (source)
- QNAP fixes six Rsync vulnerabilities in NAS backup, recovery app (source)
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891) (source)