This vulnerability allows local attackers to escalate privileges on affected installations of QNAP NAS. Authentication is required to exploit this vulnerability. The specific flaw exists within the Malware Remover application. A crafted TAR file in the file system can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the admin user.
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP NAS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-12891 is considered high due to the potential for local privilege escalation on QNAP NAS devices.
To fix ZDI-CAN-12891, ensure that your QNAP NAS software is updated to the latest version provided by QNAP that addresses this vulnerability.
ZDI-CAN-12891 affects local users with authentication access to QNAP NAS devices running the vulnerable Malware Remover application.
ZDI-CAN-12891 allows local attackers to escalate their privileges by exploiting a flaw in the Malware Remover application.
Yes, authentication is required to exploit ZDI-CAN-12891, as it involves local access to the affected QNAP NAS.