CVE-2023-47563

7.4 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in QNAP Video Station that allows authenticated users to execute arbitrary commands on the system. The vulnerability affects Video Station versions before 5.8.2 and could lead to complete system compromise.

💻 Affected Systems

Products:
  • QNAP Video Station
Versions: All versions before 5.8.2
Operating Systems: QTS, QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all QNAP NAS devices running vulnerable Video Station versions. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root privileges, data theft, ransomware deployment, or creation of persistent backdoors.

🟠

Likely Case

Authenticated attackers gaining shell access to install malware, exfiltrate data, or pivot to other systems on the network.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and minimal user privileges.

🌐 Internet-Facing: HIGH if Video Station is exposed to the internet with authenticated user access.
🏢 Internal Only: MEDIUM as it requires authenticated access but could be exploited by malicious insiders or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection vulnerabilities are typically easy to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Video Station 5.8.2 and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-24-24

Restart Required: Yes

Instructions:

1. Log into QNAP App Center. 2. Check for Video Station updates. 3. Install Video Station 5.8.2 or later. 4. Restart Video Station service or the NAS device.

🔧 Temporary Workarounds

Disable Video Station

linux

Temporarily disable Video Station service until patching is possible

ssh admin@qnap-nas 'sudo /etc/init.d/video-station.sh stop'

Network isolation

linux

Restrict network access to Video Station using firewall rules

iptables -A INPUT -p tcp --dport [VideoStationPort] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Video Station from critical systems
  • Enforce strong authentication policies and limit user access to Video Station

🔍 How to Verify

Check if Vulnerable:

Check Video Station version in QNAP App Center or via SSH: 'video-station --version'

Check Version:

ssh admin@qnap-nas 'video-station --version'

Verify Fix Applied:

Confirm Video Station version is 5.8.2 or higher in App Center

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Video Station process spawning unexpected child processes
  • Failed authentication attempts followed by command execution

Network Indicators:

  • Unusual outbound connections from Video Station service
  • Suspicious payloads in Video Station API requests

SIEM Query:

process.name="video-station" AND (process.parent.name="sh" OR process.parent.name="bash")

🔗 References

📤 Share & Export