CVE-2023-51366

8.7 HIGH

📋 TL;DR

This path traversal vulnerability in QNAP operating systems allows authenticated users to access files outside intended directories via network requests. It affects multiple QNAP NAS devices running vulnerable QTS/QuTS hero versions, potentially exposing sensitive system files and user data.

💻 Affected Systems

Products:
  • QNAP QTS
  • QNAP QuTS hero
Versions: Versions before QTS 5.1.6.2722 build 20240402 and QuTS hero h5.1.6.2734 build 20240414
Operating Systems: QNAP NAS operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects multiple QNAP NAS models running vulnerable OS versions. Authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via reading sensitive configuration files, SSH keys, password hashes, or other credentials leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized reading of sensitive files containing user data, configuration details, or system information that could facilitate further attacks.

🟢

If Mitigated

Limited file access restricted by proper network segmentation and access controls, with minimal data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity once the vulnerable endpoint is identified. Requires authenticated access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QTS 5.1.6.2722 build 20240402 or later, QuTS hero h5.1.6.2734 build 20240414 or later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-24-20

Restart Required: Yes

Instructions:

1. Log into QNAP web interface. 2. Go to Control Panel > System > Firmware Update. 3. Check for updates and install latest version. 4. Reboot the NAS after update completes.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict NAS access to trusted networks only

Access Control Hardening

all

Implement strict user permissions and disable unnecessary services

🧯 If You Can't Patch

  • Implement strict network access controls to limit NAS exposure
  • Enable detailed logging and monitor for unusual file access patterns

🔍 How to Verify

Check if Vulnerable:

Check QTS/QuTS hero version in Control Panel > System > Firmware Update

Check Version:

ssh admin@nas_ip 'cat /etc/config/uLinux.conf | grep version'

Verify Fix Applied:

Verify version is QTS 5.1.6.2722 build 20240402 or later, or QuTS hero h5.1.6.2734 build 20240414 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Multiple failed path traversal attempts
  • Access to system files by non-admin users

Network Indicators:

  • HTTP requests with directory traversal sequences (../, ..\)
  • Unusual file download patterns from NAS

SIEM Query:

source="qnap_nas" AND (uri="*../*" OR uri="*..\*")

🔗 References

📤 Share & Export