CVE-2024-38643

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in QNAP Notes Station 3 allows remote attackers to bypass authentication and execute privileged functions without credentials. All users running vulnerable versions are affected, potentially leading to complete system compromise. The vulnerability stems from missing authentication checks on critical functions within the application.

💻 Affected Systems

Products:
  • QNAP Notes Station 3
Versions: All versions before 3.9.7
Operating Systems: QTS, QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of Notes Station 3 prior to the patched version, regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attackers gain administrative control over Notes Station 3, potentially accessing sensitive notes, executing arbitrary commands, and compromising the underlying QNAP NAS system.

🟠

Likely Case

Attackers access and manipulate notes data, create/delete notes, and potentially pivot to other services on the NAS.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the Notes Station application only.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated remote exploitation, making internet-exposed instances immediate targets.
🏢 Internal Only: HIGH - Even internally, any user with network access to the service can exploit this without credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description suggests straightforward exploitation requiring only network access to the service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Notes Station 3 version 3.9.7 and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-24-36

Restart Required: Yes

Instructions:

1. Log into QNAP App Center. 2. Check for updates to Notes Station 3. 3. Install version 3.9.7 or later. 4. Restart the Notes Station service or the entire NAS.

🔧 Temporary Workarounds

Disable Notes Station 3

all

Temporarily disable the vulnerable application until patching is possible

Navigate to App Center > Installed Apps > Notes Station 3 > Stop

Network Isolation

all

Restrict network access to Notes Station 3 using firewall rules

Use QNAP firewall to block external access to Notes Station ports (default: 8080, 443)

🧯 If You Can't Patch

  • Immediately disable Notes Station 3 service through App Center
  • Implement strict network access controls to limit which IPs can reach the Notes Station service

🔍 How to Verify

Check if Vulnerable:

Check Notes Station 3 version in App Center > Installed Apps. If version is below 3.9.7, system is vulnerable.

Check Version:

Check via QNAP web interface: App Center > Installed Apps > Notes Station 3

Verify Fix Applied:

Confirm Notes Station 3 version is 3.9.7 or higher in App Center, then test authentication requirements for all functions.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to administrative endpoints
  • Unexpected function executions without login events
  • Access to /cgi-bin/notes/* without authentication

Network Indicators:

  • HTTP requests to Notes Station endpoints without authentication headers
  • Unusual traffic patterns to Notes Station service

SIEM Query:

source="qnap" AND (event="unauthorized_access" OR url="*/notes/*") AND NOT auth_success="true"

🔗 References

📤 Share & Export