QNAP and Veritas Expose Critical Vulnerabilities in Their Products

December 12, 2024

Over the weekend, significant security vulnerabilities were discovered in products from two major companies: QNAP, a Taiwanese NAS (Network-Attached Storage) device manufacturer, and Veritas, an enterprise data management company. These companies disclosed a total of 31 vulnerabilities affecting a range of their products, some of which were deemed critical in severity.

QNAP’s Vulnerability Disclosure

QNAP has been actively addressing various vulnerabilities across its product line. On November 23, the company released updates addressing 24 vulnerabilities affecting multiple products, including Notes Station 3, Photo Station, AI Core, QuLog Center, QuRouter, Media Streaming Add-on, QTS, and QuTS hero operating systems. Notes Station 3, a collaborative note-taking and sharing app, was the most affected, with vulnerabilities that could potentially lead to code execution, file read/write, authentication bypass, information disclosure, and elevation of privileges. Two critical and nine high-severity vulnerabilities were prominently featured among these flaws.

Multiple Products Affected

Among the products affected by the vulnerabilities, Notes Station 3 has taken the spotlight due to the extent of its exposure. The app, designed for collaborative note-taking and sharing, could potentially be manipulated to allow unauthorized code execution, file read and write operations, bypassing authentication mechanisms, and disclosing sensitive information. Moreover, it presented a risk of privilege escalation, which could lead to full control over the system. This widespread impact necessitated a detailed and urgent response from QNAP to mitigate potential security breaches.

QNAP’s swift action on November 23 underscores the seriousness with which they have tackled these threats. The updates provided address vulnerabilities not just in Notes Station 3, but also across other tools like Photo Station and AI Core. These tools, essential for media management and artificial intelligence processing, were vulnerable to exploitation in ways that could compromise user data and system integrity. Products like QuLog Center and QuRouter, crucial for system logging and network management, were also included in the update, ensuring that even the backend processes were fortified against potential threats.

Older Operating Systems and OpenSSH Vulnerabilities

In addition to the newer applications, older versions of QNAP’s operating systems also showed significant vulnerabilities. The QTS 5.1.x and QuTS hero h5.1.x versions were notably susceptible due to existing flaws in their OpenSSH implementations. These vulnerabilities are identified by specific CVEs: CVE-2023-38408, CVE-2021-41617, and CVE-2020-14145. Addressing these issues has been a priority for QNAP, given the foundational role that these operating systems play in the overall security framework of their products.

Users running the 5.1 series of these operating systems have been advised to upgrade to the latest 5.2 series if possible. However, recognizing that an upgrade might not be immediately feasible for all users, QNAP has also provided patches for the 5.1 series. The decision to release these patches over the weekend has raised some eyebrows, with speculation that the timing was intended to minimize public scrutiny. Despite this, the prompt response by QNAP following user reports of firmware update malfunctions – by halting the rollout, investigating the issues, and re-releasing a stable version within 24 hours – reflects an agile and consumer-responsive approach to crisis management.

Veritas’s Vulnerability Disclosure

Enterprise Vault Vulnerabilities

Veritas faced its own set of challenges over the weekend, particularly with vulnerabilities identified in their Enterprise Vault product. Enterprise Vault is a key solution for enterprise data retention and email archiving, crucial for organizations maintaining compliance and managing large volumes of sensitive data. On November 24, the National Vulnerability Database published seven critical vulnerabilities rated with a severity score of 9.8 by MITRE using the CVSSv3 system. These vulnerabilities, labeled CVE-2024-53909 through CVE-2024-53915, presented significant risks related to the deserialization of untrusted data over a .NET Remoting TCP port.

The implications of these vulnerabilities are severe, as they allow attackers to execute arbitrary code and potentially gain full control of the system. The discovery of these flaws dates back to July when researcher Sina Kheirkhah reported them via the Zero-Day Initiative (ZDI). Despite a fix deadline that lapsed on November 21, Veritas disclosed these issues slightly earlier on November 15, indicating awareness but also a delay in delivering a permanent solution. This delay has prompted significant concern among users who rely heavily on Enterprise Vault for secure data management.

Delayed Patching and Mitigation

The delay in Veritas’s response has not gone unnoticed. Despite acknowledging the vulnerabilities and the existence of a mitigation strategy, the company anticipates a definitive resolution only with the release of Enterprise Vault version 15.2, expected in Q3 2025. This extended timeline leaves a considerable gap during which users must rely on interim measures to protect their systems from potential exploits. The reasons for this prolonged patching schedule have not been disclosed, raising questions about the underlying complexities and challenges involved in addressing these vulnerabilities.

Veritas has detailed interim mitigation strategies in their advisory, recommending steps to limit administrator access and ensure operational firewalls. These measures are designed to minimize the risk of exploitation by reducing the attack surface available to potential intruders. However, the delay in delivering a comprehensive patch highlights the critical need for robust security practices and the importance of timely updates in maintaining the integrity of enterprise data management systems.

Technical Details and Mitigation Strategies

Exploitation Requirements

The vulnerabilities in Veritas’s Enterprise Vault are particularly concerning due to the technical requirements needed for exploitation. The product’s handling of untrusted data through .NET Remoting services is at the core of the issue. Upon startup, the software launches several services that listen for commands on random TCP ports. These services are inherently vulnerable, providing an avenue for attackers to execute commands and take control of the system. However, the exploitation requires a degree of sophistication, including specific privileges and detailed knowledge of the target environment.

For an attacker to successfully exploit these vulnerabilities, they would need to be part of the RDP user group, possess knowledge of the server’s IP address, process IDs, dynamic TCP ports, and remote object URIs. Additionally, the server’s firewall must be improperly configured, allowing entry through these random TCP ports. These requirements, while substantial, do not make the threat any less significant, as determined attackers with these privileges can pose a severe risk to the integrity of Enterprise Vault systems.

Mitigation Measures

Mitigating these vulnerabilities involves a multi-faceted approach focused on strengthening access controls and ensuring robust firewall configurations. Veritas’s advisory emphasizes the importance of restricting administrator access to only trusted personnel and configuring firewalls to block untrusted connections. These measures are critical in reducing the attack vectors and preventing unauthorized access to the system. While these interim steps provide a level of protection, they underscore the urgent need for a permanent resolution through timely patches and upgrades.

The advisory also highlights the necessity for ongoing vigilance and adherence to security best practices. Regularly updating software, monitoring for unusual activity, and conducting security audits are essential components of a comprehensive security strategy. By implementing these measures, organizations can better protect themselves against potential exploits and ensure the continued integrity of their data management systems.

Proactive Security Management

Importance of Timely Patches

Over the weekend, significant security vulnerabilities were discovered in products from two major companies, QNAP and Veritas. QNAP, based in Taiwan, is known for manufacturing NAS (Network-Attached Storage) devices, while Veritas specializes in enterprise data management solutions. These companies have disclosed a combined total of 31 vulnerabilities affecting a diverse range of their products. Some of these vulnerabilities have been classified as critical, highlighting the serious risks they pose to users and organizations relying on these products for data storage and management. The discovered vulnerabilities could potentially be exploited by malicious actors, leading to data breaches, unauthorized access, and other serious security incidents.

QNAP and Veritas are now urging their customers to apply the necessary updates and patches to mitigate these risks. Both companies are working diligently to address these vulnerabilities and improve their products’ security. Users are advised to stay vigilant and ensure their systems are regularly updated to protect against potential threats. The swift response from both companies underscores the importance of proactive security measures in the ever-evolving landscape of cyber threats.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later