CVE-2024-48864

9.1 CRITICAL

📋 TL;DR

This vulnerability in QNAP File Station 5 allows remote attackers to read or write files and directories without proper authorization. It affects all QNAP NAS devices running vulnerable versions of File Station 5. The high CVSS score indicates significant risk to data confidentiality and integrity.

💻 Affected Systems

Products:
  • QNAP File Station 5
Versions: All versions before 5.5.6.4741
Operating Systems: QTS, QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all QNAP NAS models running vulnerable File Station versions. File Station is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary file write leading to remote code execution, data theft, or ransomware deployment.

🟠

Likely Case

Unauthorized access to sensitive files, data exfiltration, or modification of configuration files.

🟢

If Mitigated

Limited impact if network segmentation restricts access and file permissions are properly configured.

🌐 Internet-Facing: HIGH - File Station is often exposed to the internet on QNAP devices, making exploitation trivial.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this to access sensitive data or pivot to other systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on CWE-552 (Files or Directories Accessible to External Parties), exploitation likely requires minimal technical skill once details are public.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: File Station 5 5.5.6.4741 and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-24-55

Restart Required: Yes

Instructions:

1. Log into QNAP NAS admin interface. 2. Go to App Center. 3. Check for updates. 4. Update File Station to version 5.5.6.4741 or later. 5. Restart the NAS if prompted.

🔧 Temporary Workarounds

Disable File Station

linux

Temporarily disable File Station service until patching is possible

ssh admin@nas-ip
sudo /etc/init.d/file_station.sh stop

Restrict Network Access

linux

Block external access to File Station ports (typically 80, 443, 8080, 8081)

iptables -A INPUT -p tcp --dport 80,443,8080,8081 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate QNAP devices from internet and sensitive internal networks
  • Enable detailed logging and monitor for unauthorized file access attempts

🔍 How to Verify

Check if Vulnerable:

Check File Station version in QNAP App Center or via SSH: cat /etc/config/uLinux.conf | grep file_station_version

Check Version:

cat /etc/config/uLinux.conf | grep file_station_version

Verify Fix Applied:

Verify File Station version is 5.5.6.4741 or higher in App Center or via version check command

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in File Station logs
  • Failed authentication attempts followed by successful file operations

Network Indicators:

  • Unusual traffic to File Station ports from unexpected sources
  • Large data transfers from File Station

SIEM Query:

source="qnap_logs" AND (event="file_access" OR event="directory_listing") AND user="unknown" OR src_ip NOT IN [trusted_ips]

🔗 References

📤 Share & Export