CVE-2024-48863

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in QNAP License Center that allows remote attackers to execute arbitrary commands on affected systems. The vulnerability affects QNAP devices running vulnerable versions of License Center, potentially compromising the entire system.

💻 Affected Systems

Products:
  • QNAP License Center
Versions: Versions before 1.9.43
Operating Systems: QTS, QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: Affects QNAP NAS devices with License Center enabled. The vulnerability is present in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level access, data exfiltration, ransomware deployment, and lateral movement to other network systems.

🟠

Likely Case

Unauthenticated remote code execution leading to malware installation, data theft, and system disruption.

🟢

If Mitigated

Limited impact if network segmentation, strict firewall rules, and proper access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity. The vulnerability allows unauthenticated remote exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: License Center 1.9.43 and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-24-50

Restart Required: Yes

Instructions:

1. Log into QNAP App Center. 2. Check for updates to License Center. 3. Update to version 1.9.43 or later. 4. Restart the NAS device.

🔧 Temporary Workarounds

Disable License Center

all

Temporarily disable the vulnerable component until patching is possible

Navigate to App Center > License Center > Disable

Network Isolation

all

Restrict network access to QNAP management interfaces

Configure firewall to block external access to NAS management ports (typically 8080, 443)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate QNAP devices from critical systems
  • Deploy web application firewall (WAF) with command injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check License Center version in QNAP App Center. If version is below 1.9.43, the system is vulnerable.

Check Version:

ssh admin@qnap-ip 'cat /etc/config/uLinux.conf | grep license_center_version'

Verify Fix Applied:

Confirm License Center version is 1.9.43 or higher in App Center after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Suspicious processes spawned from License Center
  • Failed authentication attempts followed by command execution

Network Indicators:

  • Unusual outbound connections from QNAP device
  • Command and control traffic patterns
  • Exploit kit signatures targeting QNAP devices

SIEM Query:

source="qnap_logs" AND (process="*sh*" OR cmd="*curl*" OR cmd="*wget*") AND parent_process="license_center"

🔗 References

📤 Share & Export