First published: Fri Mar 08 2024(Updated: )
An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <4.5.4.2627 | |
QNAP QTS | >=5.1.0<5.1.3.2578 | |
QNAP QTS | =4.5.4.2627 | |
QNAP QTS | =5.1.3.2578 | |
QNAP QuTS hero | <h4.5.4.2626 | |
QNAP QuTS hero | >=h5.1.0<h5.1.3.2578 | |
QNAP QuTS hero | =h4.5.4.2626 | |
QNAP QuTS hero | =h5.1.3.2578 | |
QNAP QuTScloud | <c5.1.5.2651 |
We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21899 is classified as a critical improper authentication vulnerability.
To fix CVE-2024-21899, update your QNAP operating system to versions later than 4.5.4.2627 or 5.1.3.2578.
CVE-2024-21899 affects QNAP QTS versions from 5.1.0 to 5.1.3.2578 and from 4.5.0 to 4.5.4.2627.
Currently, there is no documented workaround for CVE-2024-21899 other than applying the necessary updates.
If you cannot update your QNAP device, it's essential to disable remote access and limit network exposure until the device can be updated.