CVE-2021-34346

9.8 CRITICAL

📋 TL;DR

A stack buffer overflow vulnerability in QNAP NVR Storage Expansion allows attackers to execute arbitrary code on affected devices. This affects QNAP devices running vulnerable versions of NVR Storage Expansion software. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • QNAP NVR Storage Expansion
Versions: Versions before 1.0.6 (2021/08/03)
Operating Systems: QTS (QNAP Turbo NAS Operating System)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects QNAP NAS devices with NVR Storage Expansion installed. The vulnerability is in the NVR Storage Expansion application itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, ransomware deployment, or device becoming part of a botnet.

🟠

Likely Case

Remote code execution allowing attackers to install malware, exfiltrate data, or pivot to other network systems.

🟢

If Mitigated

Limited impact if device is isolated, patched, or has network access controls preventing exploitation.

🌐 Internet-Facing: HIGH - QNAP devices are often exposed to the internet for remote access, making them prime targets.
🏢 Internal Only: MEDIUM - Still significant risk if attacker gains internal network access through other means.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity. Stack buffer overflows are well-understood exploitation vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NVR Storage Expansion 1.0.6 (2021/08/03) and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-21-36

Restart Required: Yes

Instructions:

1. Log into QNAP QTS web interface. 2. Go to App Center. 3. Check for updates for NVR Storage Expansion. 4. Update to version 1.0.6 or later. 5. Restart the device if required.

🔧 Temporary Workarounds

Disable NVR Storage Expansion

all

Remove or disable the vulnerable application if not needed

From QTS App Center: Uninstall NVR Storage Expansion

Network Isolation

all

Restrict network access to QNAP device

Configure firewall to block external access to QNAP management ports
Use VPN for remote access instead of direct exposure

🧯 If You Can't Patch

  • Isolate the QNAP device on a separate VLAN with strict firewall rules
  • Disable all remote access and require VPN for management

🔍 How to Verify

Check if Vulnerable:

Check NVR Storage Expansion version in QTS App Center. If version is below 1.0.6, device is vulnerable.

Check Version:

From QTS web interface: App Center → Installed Apps → Check NVR Storage Expansion version

Verify Fix Applied:

Confirm NVR Storage Expansion version is 1.0.6 or higher in App Center.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from NVR Storage Expansion
  • Buffer overflow error messages in system logs
  • Unexpected network connections from QNAP device

Network Indicators:

  • Exploit traffic patterns matching buffer overflow attempts
  • Unexpected outbound connections from QNAP device

SIEM Query:

source="qnap" AND (event_type="buffer_overflow" OR process="nvr_storage" AND action="execute")

🔗 References

📤 Share & Export