First published: Fri Sep 01 2017(Updated: )
QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack.
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | >=4.2.0<=4.2.6 | |
QNAP QTS | >=4.3.0<=4.3.3.0299 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13067 is classified as a high severity vulnerability due to its potential for remote code execution on affected devices.
To fix CVE-2017-13067, update your QNAP QTS firmware to versions 4.2.6 build 20170905 or later, or 4.3.3.0299 build 20170901 or later.
CVE-2017-13067 affects all versions of QNAP QTS prior to 4.2.6 build 20170905 and 4.3.3.0299 build 20170901.
CVE-2017-13067 is a remote code execution vulnerability that affects the QTS Media Library on QNAP NAS devices.
Yes, CVE-2017-13067 can be exploited remotely by attackers using a transcoding service on port 925.