Description:
QNAP has published security advisories to address multiple vulnerabilities in QNAP products. The list of patches can be found at:
https://www.qnap.com/en/security-advisory/qsa-25-09
https://www.qnap.com/en/security-advisory/qsa-25-10
https://www.qnap.com/en/security-advisory/qsa-25-11
https://www.qnap.com/en/security-advisory/qsa-25-12
https://www.qnap.com/en/security-advisory/qsa-25-13
https://www.qnap.com/en/security-advisory/qsa-25-14
https://www.qnap.com/en/security-advisory/qsa-25-15
https://www.qnap.com/en/security-advisory/qsa-25-16
https://www.qnap.com/en/security-advisory/qsa-25-17
Affected Systems:
- QNAP NAS devices running File Station 5 versions prior to 5.5.6.4791
- QNAP NAS devices running License Center versions prior to 1.9.49
- QNAP NAS devices running QES versions prior to QES 2.2.1 build 20241231
- QNAP NAS devices running Qsync Central versions prior to 4.5.0.6 (2025/03/20)
- QNAP NAS devices running QTS operating system versions prior to 5.2.4.3079 build 20250321
- QNAP NAS devices running QuRouter versions prior to 2.5.0.140
- QNAP NAS devices running QuTS hero operating system versions prior to h5.2.4.3079 build 20250321
For detailed information of the affected systems, please refer to the corresponding security advisory at vendor's website.
Impact:
Successful exploitation of the vulnerabilities could lead to remote code execution, denial of service, information disclosure, security restriction bypass, spoofing or tampering on an affected system.
Recommendation:
Patches for affected systems are available. System administrators of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
More Information:
- https://www.qnap.com/en/security-advisory/qsa-25-09
- https://www.qnap.com/en/security-advisory/qsa-25-10
- https://www.qnap.com/en/security-advisory/qsa-25-11
- https://www.qnap.com/en/security-advisory/qsa-25-12
- https://www.qnap.com/en/security-advisory/qsa-25-13
- https://www.qnap.com/en/security-advisory/qsa-25-14
- https://www.qnap.com/en/security-advisory/qsa-25-15
- https://www.qnap.com/en/security-advisory/qsa-25-16
- https://www.qnap.com/en/security-advisory/qsa-25-17
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28370
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13087 (to CVE-2024-13088)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50406
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56805
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22481 (to CVE-2025-22482)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22484
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22486
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22490
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465 (to CVE-2025-26466)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29871 (to CVE-2025-29873)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29876 (to CVE-2024-29877)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29883 (to CVE-2025-29885)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29892 (to CVE-2025-29892)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30279
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-33031
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-33035