First published: Thu May 05 2022(Updated: )
An improper link resolution before file access ('Link Following') vulnerability has been reported to affect QNAP device running QuTScloud, QuTS hero, and QTS. If exploited, this vulnerability allows remote attackers to traverse the file system to unintended locations and read or overwrite the contents of unexpected files. We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero, and QTS: QuTScloud c5.0.1.1998 and later QuTS hero h4.5.4.1971 build 20220310 and later QuTS hero h5.0.0.1986 build 20220324 and later QTS 4.3.4.1976 build 20220303 and later QTS 4.3.3.1945 build 20220303 and later QTS 4.2.6 build 20220304 and later QTS 4.3.6.1965 build 20220302 and later QTS 5.0.0.1986 build 20220324 and later QTS 4.5.4.1991 build 20220329 and later
Credit: security@qnapsecurity.com.tw security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | >=5.0.0.1716<5.0.0.1986 | |
QNAP QTS | >=4.3.3.0174<4.3.3.1945 | |
QNAP QTS | >=4.3.4.0899<4.3.4.1976 | |
QNAP QTS | >=4.3.6.0895<4.3.6.1965 | |
QNAP QTS | >=4.4.0.0883<4.5.4.1991 | |
QNAP QTS | =4.2.6-build_20170517 | |
QNAP QTS | =4.2.6-build_20190322 | |
QNAP QTS | =4.2.6-build_20190730 | |
QNAP QTS | =4.2.6-build_20190921 | |
QNAP QTS | =4.2.6-build_20191107 | |
QNAP QTS | =4.2.6-build_20200109 | |
QNAP QTS | =4.2.6-build_20200421 | |
QNAP QTS | =4.2.6-build_20200611 | |
QNAP QTS | =4.2.6-build_20200821 | |
QNAP QTS | =4.2.6-build_20210327 | |
QNAP QTS | =4.2.6-build_20211215 | |
QNAP QuTS hero | <h4.5.4.1771 | |
QNAP QuTS hero | >=h5.0.0.1772<h5.0.0.1986 | |
QNAP QuTScloud | <c5.0.1.1998 | |
QNAP QTS | >=4.3.3.0174<4.3.3.1945 | |
QNAP QTS | >=4.3.4.0899<4.3.4.1976 | |
QNAP QTS | >=4.3.6.0895<4.3.6.1965 | |
QNAP QTS | >=4.4.0.0883<4.5.4.1991 | |
QNAP QTS | =4.2.6-build_20170517 | |
QNAP QTS | =4.2.6-build_20190322 | |
QNAP QTS | =4.2.6-build_20190730 | |
QNAP QTS | =4.2.6-build_20190921 | |
QNAP QTS | =4.2.6-build_20191107 | |
QNAP QTS | =4.2.6-build_20200109 | |
QNAP QTS | =4.2.6-build_20200421 | |
QNAP QTS | =4.2.6-build_20200611 | |
QNAP QTS | =4.2.6-build_20200821 | |
QNAP QTS | =4.2.6-build_20210327 | |
QNAP QTS | =4.2.6-build_20211215 |
We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero, and QTS: QuTScloud c5.0.1.1998 and later QuTS hero h4.5.4.1971 build 20220310 and later QuTS hero h5.0.0.1986 build 20220324 and later QTS 4.3.4.1976 build 20220303 and later QTS 4.3.3.1945 build 20220303 and later QTS 4.2.6 build 20220304 and later QTS 4.3.6.1965 build 20220302 and later QTS 5.0.0.1986 build 20220324 and later QTS 4.5.4.1991 build 20220329 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44052 is an 'Improper Link Resolution Before File Access' vulnerability that affects QNAP devices running QuTScloud, QuTS hero, and QTS.
CVE-2021-44052 allows remote attackers to traverse the file system to unintended locations and read or overwrite the content.
QNAP QTS versions 4.3.3.0174 to 4.3.3.1945, 4.3.4.0899 to 4.3.4.1976, 4.3.6.0895 to 4.3.6.1965, 4.4.0.0883 to 4.5.4.1991, 5.0.0.1716 to 5.0.0.1986, and QuTScloud and QuTS hero versions h4.5.4.1771 to h5.0.0.1986 are affected by CVE-2021-44052.
The severity of CVE-2021-44052 is high, with a CVSS score of 8.1.
To fix the CVE-2021-44052 vulnerability, update your QNAP device to a version that is not affected by the vulnerability.