CVE-2024-50396

8.8 HIGH

📋 TL;DR

A format string vulnerability in QNAP operating systems allows remote attackers to read sensitive memory or modify memory contents. This affects QTS and QuTS hero users running vulnerable versions. Successful exploitation could lead to information disclosure or system compromise.

💻 Affected Systems

Products:
  • QTS
  • QuTS hero
Versions: Versions before QTS 5.2.1.2930 build 20241025 and QuTS hero h5.2.1.2929 build 20241025
Operating Systems: QNAP NAS operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: All QNAP devices running affected OS versions are vulnerable by default

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data exfiltration, or ransomware deployment

🟠

Likely Case

Information disclosure of sensitive data from memory, potentially including credentials or encryption keys

🟢

If Mitigated

Limited information leakage with proper network segmentation and access controls

🌐 Internet-Facing: HIGH - QNAP devices are often exposed to the internet for remote access
🏢 Internal Only: MEDIUM - Requires attacker to have network access to vulnerable device

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Format string vulnerabilities typically require specific knowledge of memory layout but can be exploited remotely

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QTS 5.2.1.2930 build 20241025 or later, QuTS hero h5.2.1.2929 build 20241025 or later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-24-43

Restart Required: Yes

Instructions:

1. Log into QNAP web interface. 2. Go to Control Panel > System > Firmware Update. 3. Check for updates and install latest version. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Network isolation

all

Restrict network access to QNAP devices using firewall rules

Disable remote access

all

Turn off external access features like myQNAPcloud, UPnP, and port forwarding

🧯 If You Can't Patch

  • Isolate QNAP devices on separate VLAN with strict firewall rules
  • Implement network-based intrusion detection to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check current QTS/QuTS hero version in Control Panel > System > Firmware Update

Check Version:

ssh admin@qnap-ip 'cat /etc/config/uLinux.conf | grep version'

Verify Fix Applied:

Verify version is QTS 5.2.1.2930 build 20241025 or later, or QuTS hero h5.2.1.2929 build 20241025 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual format string patterns in application logs
  • Memory access violations in system logs
  • Failed authentication attempts followed by format string patterns

Network Indicators:

  • Unusual traffic to QNAP management ports
  • Patterns matching format string exploitation in network traffic

SIEM Query:

source="qnap_logs" AND ("format string" OR "%n" OR "%s" OR memory_access_violation)

🔗 References

📤 Share & Export