Article Details

Original Article Text

Click to Toggle View

QNAP QTS zero-day in Share feature gets public RCE exploit. An extensive security audit of QNAP QTS, the operating system for the company's NAS products, has uncovered fifteen vulnerabilities of varying severity, with eleven remaining unfixed. Among them is CVE-2024-27130, an unpatched stack buffer overflow vulnerability in the 'No_Support_ACL' function of 'share.cgi,' which could enable an attacker to perform remote code execution when specific prerequisites are met. The vendor responded to the vulnerability reports submitted between December 12, 2023, and January 23, 2024, with multiple delays and has fixed only four of the fifteen flaws. The vulnerabilities were discovered by WatchTowr Labs, who published the complete details of their findings and a proof of concept (PoC) exploit for CVE-2024-27130 on Friday. The QTS vulnerabilities The flaws uncovered by WatchTowr analysts are primarily related to code execution, buffer overflows, memory corruption, authentication bypass, and XSS issues, impacting the security of Network Attached Storage (NAS) devices across different deployment environments. WatchTowr lists a total of fifteen flaws, summarized as follows: The above bugs impact QTS, the NAS operating system on QNAP devices, QuTScloud, the VM-optimized version of QTS, and QTS hero, a specialized version focused on high performance. QNAP has addressed CVE-2023-50361 through CVE-2023-50364 in a security update released in April 2024, in versions QTS 5.1.6.2722 build 20240402 and later, and QuTS hero h5.1.6.2734 build 20240414 and later. However, all the other vulnerabilities discovered by WatchTowr remain unaddressed. PoC for zero-day RCE The QNAP CVE-2024-27130 vulnerability is caused by the unsafe use of the 'strcpy' function in the No_Support_ACL function. This function is utilized by the get_file_size request in the share.cgi script, used when sharing media with external users. An attacker can craft a malicious request with a specially crafted 'name' parameter, causing the buffer overflow leading to remote code execution. To exploit CVE-2024-27130, the attacker needs a valid 'ssid' parameter, which is generated when a NAS user shares a file from their QNAP device. This parameter is included in the URL of the 'share' link created on a device, so an attacker would be required to use some social engineering to gain access to it. However, BleepingComputer found that users sometimes share these links online, allowing them to be indexed and retrieved from a simple Google search. In summary, CVE-2024-27130 isn't straightforward to exploit, yet the SSID prerequisite can be met for determined actors. WatchTowr published an exploit on GitHub, in which they demonstrate how to craft a payload that creates a 'watchtowr' account to a QNAP device and adds them to the sudoers for elevated privileges. BleepingComputer has contacted QNAP for a statement on the disclosed flaws, but a comment wasn't immediately available.

Daily Brief Summary

CYBERCRIME // QNAP Systems Hit by Critical Unpatched Remote Code Exploit

A security audit of QNAP QTS uncovered fifteen vulnerabilities, eleven of which remain unfixed.

The critical vulnerability, CVE-2024-27130, allows remote code execution via a stack buffer overflow in the Share feature.

For exploitation, a crafted request using a 'name' parameter and a valid 'ssid' parameter from the NAS share link is needed.

Although the exploit requires specific conditions, shared links can sometimes be found online, increasing risk exposure.

WatchTowr Labs developed a proof of concept that creates a privileged account when the exploit is successful.

QNAP issued security updates in April 2024 for four of the vulnerabilities, but did not address the others.

Despite multiple delays in response, QNAP has yet to comment on these latest findings.