CVE-2018-19945

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to rename arbitrary files on affected QNAP devices due to improper pathname restrictions. It affects QNAP devices running QTS versions 4.3.4 to 4.3.6. Successful exploitation could lead to system compromise or data manipulation.

💻 Affected Systems

Products:
  • QNAP NAS devices
Versions: QTS 4.3.4 to 4.3.6 (excluding fixed versions)
Operating Systems: QTS (QNAP Turbo NAS System)
Default Config Vulnerable: ⚠️ Yes
Notes: Does not affect QTS 4.4.x or 4.5.x. Only affects specific older QTS versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through file manipulation leading to privilege escalation, data destruction, or installation of persistent backdoors.

🟠

Likely Case

Unauthorized file renaming leading to service disruption, data corruption, or limited system access.

🟢

If Mitigated

Minimal impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires some level of access to the system. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QTS 4.3.6.0895 build 20190328 or later, QTS 4.3.4.0899 build 20190322 or later

Vendor Advisory: https://www.qnap.com/zh-tw/security-advisory/qsa-20-21

Restart Required: Yes

Instructions:

1. Log into QTS web interface. 2. Go to Control Panel > System > Firmware Update. 3. Check for updates and install the latest firmware. 4. Reboot the device after installation.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to QNAP devices to trusted networks only

Access Control Hardening

all

Implement strict user permissions and disable unnecessary services

🧯 If You Can't Patch

  • Isolate affected devices from internet and untrusted networks
  • Implement strict firewall rules to limit access to QNAP management interfaces

🔍 How to Verify

Check if Vulnerable:

Check QTS version in Control Panel > System > Firmware Update. If version is between 4.3.4 and 4.3.6 and build date is before March 2019, device is vulnerable.

Check Version:

Check via QTS web interface: Control Panel > System > Firmware Update

Verify Fix Applied:

Verify QTS version is 4.3.6.0895 build 20190328 or later, or 4.3.4.0899 build 20190322 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file rename operations in system logs
  • Unexpected file permission changes
  • Failed authentication attempts followed by file operations

Network Indicators:

  • Unusual traffic to QNAP management ports from untrusted sources
  • Multiple failed login attempts

SIEM Query:

source="qnap_logs" AND (event="file_rename" OR event="permission_change") AND user!="authorized_user"

🔗 References

📤 Share & Export