First published: Thu Jun 03 2021(Updated: )
A DOM-based XSS vulnerability has been reported to affect QNAP NAS running QTS and QuTS hero. If exploited, this vulnerability allows attackers to inject malicious code. This issue affects: QNAP Systems Inc. QTS versions prior to 4.5.3.1652 Build 20210428. QNAP Systems Inc. QuTS hero versions prior to h4.5.2.1638 Build 20210414. QNAP Systems Inc. QuTScloud versions prior to c4.5.5.1656 Build 20210503. This issue does not affect: QNAP Systems Inc. QTS 4.3.6; 4.3.3.
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <4.5.3.1652 | |
QNAP QuTS hero | <h4.5.2.1638 | |
QNAP QuTScloud | <c4.5.5.1656 |
QNAP have already fixed this vulnerability in the following versions: QTS 4.5.3.1652 Build 20210428 and later QuTS hero h4.5.2.1638 Build 20210414 and later QuTScloud c4.5.5.1656 Build 20210503 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-28806.
The severity rating of CVE-2021-28806 is medium, with a score of 5.4.
CVE-2021-28806 affects QNAP NAS running QTS and QuTS hero versions prior to specified builds.
CVE-2021-28806 allows attackers to inject malicious code, compromising the security of the affected QNAP NAS devices.
To fix CVE-2021-28806, users should update their QNAP NAS to QTS version 4.5.3.1652 Build 20210428 or later, or update QuTS hero to version h4.5.2.1638 or later.