CVE-2023-34976

10.0 CRITICAL

📋 TL;DR

This SQL injection vulnerability in QNAP Video Station allows authenticated attackers to execute arbitrary SQL commands via network requests. It affects users running vulnerable versions of Video Station, potentially compromising the underlying database and system.

💻 Affected Systems

Products:
  • QNAP Video Station
Versions: Versions before 5.7.0 (2023/07/27)
Operating Systems: QTS, QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access, but default configurations may be vulnerable if Video Station is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including data theft, data manipulation, privilege escalation, and potential remote code execution on the underlying server.

🟠

Likely Case

Database compromise leading to data exfiltration, data corruption, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented, though authenticated access still required.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit once the injection point is identified. Requires authenticated access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Video Station 5.7.0 (2023/07/27) and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-23-52

Restart Required: Yes

Instructions:

1. Log into QNAP App Center
2. Check for Video Station updates
3. Update to version 5.7.0 or later
4. Restart Video Station service

🔧 Temporary Workarounds

Disable Video Station

linux

Temporarily disable Video Station service until patching is possible

ssh into QNAP device
sudo /etc/init.d/video-station.sh stop

Network Segmentation

all

Restrict network access to Video Station service

Configure firewall rules to limit access to Video Station port

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach Video Station
  • Monitor for SQL injection attempts in application logs and database queries

🔍 How to Verify

Check if Vulnerable:

Check Video Station version in QNAP App Center or via SSH: cat /etc/config/video-station.conf | grep version

Check Version:

cat /etc/config/video-station.conf | grep version

Verify Fix Applied:

Confirm Video Station version is 5.7.0 or later in App Center

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts followed by SQL-like payloads
  • Video Station access logs showing suspicious parameter values

Network Indicators:

  • Unusual database connections from Video Station host
  • SQL error messages in HTTP responses

SIEM Query:

source="video-station.log" AND ("sql" OR "union" OR "select" OR "insert" OR "delete" OR "update")

🔗 References

📤 Share & Export