First published: Wed Jun 16 2021(Updated: )
Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link versions prior to 2.2.21 on QTS 4.5.3; versions prior to 2.2.21 on QuTS hero h4.5.2; versions prior to 2.2.21 on QuTScloud c4.5.4.
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Qnap Myqnapcloud Link | <2.2.21 | |
QNAP QTS | =4.5.3 | |
QNAP QuTS hero | =h4.5.2 | |
QNAP QuTScloud | =c4.5.4 |
QNAP have already fixed this vulnerability in the following versions of myQNAPcloud Link: QTS 4.5.3: myQNAPcloud Link 2.2.21 and later QuTS hero h4.5.2: myQNAPcloud Link 2.2.21 and later QuTScloud c4.5.4: myQNAPcloud Link 2.2.21 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28815 is a vulnerability that affects QNAP NAS running myQNAPcloud Link, allowing remote attackers to read sensitive information through unrestricted storage mechanism.
CVE-2021-28815 allows remote attackers to access unrestricted storage mechanism and read sensitive information on QNAP NAS running myQNAPcloud Link.
The software version affected by CVE-2021-28815 is myQNAPcloud Link up to version 2.2.21.
CVE-2021-28815 has a severity rating of 4.9 (medium).
To fix the CVE-2021-28815 vulnerability, update myQNAPcloud Link to a version higher than 2.2.21 as recommended by QNAP Systems Inc.