2026年5月12日星期二

QNAP NAS Elevation of Privilege Vulnerability

QNAP NAS Elevation of Privilege Vulnerability

Release Date: 12 May 2026

RISK: Medium Risk

TYPE: Servers - Other Servers

A vulnerability was identified in QNAP NAS. A local attacker can exploit this vulnerability to trigger elevation of privilege on the targeted system.

 

Note: 

CVE-2026-43284 is being scattered exploited. A local privilege escalation vulnerability, commonly known as "Dirty Frag", has been reported to affect the Linux kernel. If exploited, this vulnerability could allow an authenticated local user with standard privileges to bypass security restrictions and gain elevated system (root) permissions.

 

No patch is currently available for CVE-2026-43284 of the affected products.


Impact

  • Elevation of Privilege

System / Technologies affected

  • All QNAP ARM64-based NAS models
  • All QNAP x86-based NAS models
  • All QuTS hero NAS models
  • All QuTScloud NAS instances

Solutions

Workaround:

Mitigate the vulnerability of attacks by following workaround:

 

  1. Restrict Shell Access: Revoke SSH or Telnet terminal permissions for all non-administrator accounts.
  2. Container Security: Deploy only trusted images within Container Station and avoid running containers with "Privileged" mode enabled.
  3. Minimize Attack Surface: Disable unused services, such as the Web Server, and uninstall non-essential third-party applications.
  4. Network Isolation: Ensure your NAS is not directly exposed to the internet. Utilize QuFirewall or a VPN to restrict access to trusted internal networks only.

Please visit the vendor web-site for more details.

 

Apply workarounds issued by the vendor:

 

 

 


    Vulnerability Identifier


    Source


    Related Link

    沒有留言:

    發佈留言

    QNAP NAS 權限提升漏洞

    QNAP NAS 權限提升漏洞 發佈日期: 2026年05月12日 風險: 中度風險 類型: 伺服器 - 其他伺服器 於 QNAP NAS 發現一個漏洞。本地攻擊者可利用這個漏洞,於目標系統觸發權限提升。   注意: CVE-2026-43284 正被利用作零星攻擊。一項稱為 「...