CVE-2025-52853
📋 TL;DR
A NULL pointer dereference vulnerability in QNAP operating systems allows remote attackers with administrator credentials to cause denial-of-service conditions. This affects QTS and QuTS hero systems running vulnerable versions. The vulnerability requires administrative access to exploit.
💻 Affected Systems
- QTS
- QuTS hero
📦 What is this software?
Qts by Qnap
Qts by Qnap
Qts by Qnap
Qts by Qnap
Qts by Qnap
Qts by Qnap
Qts by Qnap
Qts by Qnap
Qts by Qnap
Qts by Qnap
Qts by Qnap
Qts by Qnap
Qts by Qnap
Qts by Qnap
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash or unavailability of QNAP device services, requiring physical intervention to restore functionality.
Likely Case
Temporary service disruption affecting specific QNAP services or applications until system restart.
If Mitigated
No impact if proper access controls prevent unauthorized administrative access.
🎯 Exploit Status
Exploitation requires administrative credentials. No public exploit code has been reported.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: QTS 5.2.6.3195 build 20250715 and later, QuTS hero h5.2.6.3195 build 20250715 and later
Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-25-36
Restart Required: Yes
Instructions:
1. Log into QNAP web interface as administrator. 2. Navigate to Control Panel > System > Firmware Update. 3. Check for updates and install QTS 5.2.6.3195 or later, or QuTS hero h5.2.6.3195 or later. 4. Reboot the NAS after installation completes.
🔧 Temporary Workarounds
Restrict administrative access
allLimit administrative access to trusted IP addresses and networks only.
In QNAP web interface: Control Panel > Security > Allow/Deny List > Add trusted IPs
Disable remote admin access
allDisable administrative access from external networks.
In QNAP web interface: Control Panel > Network & File Services > Telnet/SSH > Disable remote access
🧯 If You Can't Patch
- Implement strict network segmentation to isolate QNAP devices from untrusted networks.
- Enforce strong password policies and multi-factor authentication for all administrative accounts.
🔍 How to Verify
Check if Vulnerable:
Check current firmware version in QNAP web interface: Control Panel > System > Firmware Update > Current Version.
Check Version:
ssh admin@qnap-ip 'cat /etc/config/uLinux.conf | grep version'
Verify Fix Applied:
Verify firmware version is QTS 5.2.6.3195 build 20250715 or later, or QuTS hero h5.2.6.3195 build 20250715 or later.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by successful admin login and system crash logs
- Kernel panic or system crash entries in /var/log/messages
Network Indicators:
- Unusual administrative login patterns from unexpected IP addresses
- Sudden cessation of QNAP service responses
SIEM Query:
source="qnap" AND (event_type="authentication" AND result="success" AND user="admin") FOLLOWED BY event_type="system" AND message="crash" OR "panic" WITHIN 5m