CVE-2024-48864
📋 TL;DR
This vulnerability in QNAP File Station 5 allows remote attackers to read or write files and directories without proper authorization. It affects all QNAP NAS devices running vulnerable versions of File Station 5. The high CVSS score indicates significant risk to data confidentiality and integrity.
💻 Affected Systems
- QNAP File Station 5
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via arbitrary file write leading to remote code execution, data theft, or ransomware deployment.
Likely Case
Unauthorized access to sensitive files, data exfiltration, or modification of configuration files.
If Mitigated
Limited impact if network segmentation restricts access and file permissions are properly configured.
🎯 Exploit Status
Based on CWE-552 (Files or Directories Accessible to External Parties), exploitation likely requires minimal technical skill once details are public.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: File Station 5 5.5.6.4741 and later
Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-24-55
Restart Required: Yes
Instructions:
1. Log into QNAP NAS admin interface. 2. Go to App Center. 3. Check for updates. 4. Update File Station to version 5.5.6.4741 or later. 5. Restart the NAS if prompted.
🔧 Temporary Workarounds
Disable File Station
linuxTemporarily disable File Station service until patching is possible
ssh admin@nas-ip
sudo /etc/init.d/file_station.sh stop
Restrict Network Access
linuxBlock external access to File Station ports (typically 80, 443, 8080, 8081)
iptables -A INPUT -p tcp --dport 80,443,8080,8081 -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate QNAP devices from internet and sensitive internal networks
- Enable detailed logging and monitor for unauthorized file access attempts
🔍 How to Verify
Check if Vulnerable:
Check File Station version in QNAP App Center or via SSH: cat /etc/config/uLinux.conf | grep file_station_version
Check Version:
cat /etc/config/uLinux.conf | grep file_station_version
Verify Fix Applied:
Verify File Station version is 5.5.6.4741 or higher in App Center or via version check command
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in File Station logs
- Failed authentication attempts followed by successful file operations
Network Indicators:
- Unusual traffic to File Station ports from unexpected sources
- Large data transfers from File Station
SIEM Query:
source="qnap_logs" AND (event="file_access" OR event="directory_listing") AND user="unknown" OR src_ip NOT IN [trusted_ips]