Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
In May 2024, cyber security researchers uncovered a significant vulnerability within QNAP’s QTS operating system, a critical software powering the company’s NAS (Network Attached Storage) devices. This vulnerability, known as CVE-2024-27130, poses a serious threat to users due to its potential for remote code execution (RCE).
The QNAP QTS operating system is widely used in NAS devices, which are essential for data storage and sharing in both small businesses and large enterprises. These devices are attractive targets for cybercriminals because they often store sensitive and valuable data.
In a thorough security audit conducted by WatchTowr Labs, 15 vulnerabilities of varying severity were identified within QTS. Among these, CVE-2024-27130 stood out due to its potential for remote code execution. This particular vulnerability is rooted in a stack buffer overflow within the ‘No_Support_ACL’ function of the ‘share.cgi’ script. Exploiting this flaw allows attackers to execute arbitrary code on the affected device, potentially leading to full system compromise.
To exploit CVE-2024-27130, attackers need to obtain a valid ‘ssid’ parameter, which is generated when a NAS user shares a file. This parameter is often included in the URL of the shared link. Once the ‘ssid’ is acquired, the attacker can craft a malicious request with a specially crafted ‘name’ parameter that causes a buffer overflow, resulting in remote code execution.
While obtaining the ‘ssid’ requires some degree of social engineering or access to shared links, these links are sometimes publicly accessible or indexed by search engines, making it easier for attackers to find them.
To mitigate the risk posed by this and similar vulnerabilities, users should take several precautions:
If you suspect that your NAS device has been compromised, follow these steps:
The discovery of the QNAP QTS zero-day vulnerability highlights the importance of vigilance in cyber security. By understanding how such vulnerabilities can be exploited and implementing robust preventive measures, users can significantly reduce the risk of becoming victims. Regular updates, cautious sharing practices, and strong security protocols are essential in safeguarding valuable data stored on NAS devices. If a compromise does occur, prompt action and thorough investigation can mitigate the impact and prevent further damage.
For more detailed technical insights and proof of concept (PoC) exploit demonstrations, refer to the original sources from WatchTowr Labs and BleepingComputer: