CVE-2024-50387: Critical QNAP Flaw Exploited in Hacking Contest, Patch Now!

CVE-2024-50387 & CVE-2024-50389 QuRouter

In a thrilling showdown at the recent Pwn2Own Ireland 2024 hacking competition, white hat hackers YingMuo (@YingMuo), in collaboration with the DEVCORE Internship Program, successfully exploited a critical zero-day vulnerability in QNAP’s SMB Service. This vulnerability, tracked as CVE-2024-50387, allowed the team to gain complete control of a QNAP TS-464 NAS device.

The attack, which involved a clever combination of argument injection and SQL injection techniques, earned the team a $20,000 prize and 4 Master of Pwn points.

QNAP, known for its robust NAS solutions, responded swiftly to the discovery. Despite having a 90-day grace period before public disclosure, the company promptly released updates to address the vulnerability. Users of QNAP NAS devices are strongly urged to update their SMB Service to version 4.15.002 or later to mitigate the risk of exploitation.

Updating your QNAP NAS is a straightforward process:

  1. Log in: Access your QTS or QuTS hero interface as an administrator.
  2. Open App Center: Locate and launch the App Center.
  3. Search for SMB Service: Use the search box to find “SMB Service.”
  4. Update: Click the “Update” button next to the SMB Service listing.
  5. Confirm: Confirm the update process to install the latest version.

Unpatched vulnerabilities like CVE-2024-50387 expose systems to unauthorized access, data theft, and other cybersecurity risks. While the vulnerability has been responsibly disclosed and fixed, NAS users should remain vigilant with frequent updates and regular system checks.

Related Posts: