![]() This problem isn't related to the Deadbolt ransomware attacks that have hit QNAP NAS users over the last several months. Users can also manually download the update from QNAP's website. Then, navigate to Control Panel > System > Firmware Update. To install the update, first log on to QTS, QuTS hero, or QuTScloud as administrator. ![]() The exploit only works in systems running nginx, which QNAP NAS systems don't have installed by default. QTS 5.0.1 build 20220515 and later as well as QuTS hero h5. The affected OS versions include QTS 5.0 and 4.5, along with QuTS hero h5.0, 4.5, and c5.0. Attackers could exploit it to gain remote execution on QNAP operating systems. ![]() The NAS company announced this week that it has fixed a vulnerability affecting PHP versions 7.1.x, 7.1.33, 7.2.x, 7.2.24, 7.3.x, and 7.3.11. QNAP has released a security update addressing an nginx vulnerability, the latest in a series of security issues facing the company since January. PSA: Anyone using a QNAP NAS while running nginx and php-fpm should probably update its firmware now.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |