CVE-2025-54167

N/A Unknown

📋 TL;DR

This cross-site scripting (XSS) vulnerability in QNAP Notification Center allows attackers with administrator access to inject malicious scripts that could bypass security controls or access sensitive application data. The vulnerability affects multiple versions of Notification Center software. Organizations using vulnerable versions should patch immediately.

💻 Affected Systems

Products:
  • QNAP Notification Center
Versions: All versions before Notification Center 2.1.0.3443, 1.9.2.3163, and 3.0.0.3466
Operating Systems: QTS, QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator account access to exploit. Affects QNAP NAS devices running vulnerable Notification Center versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leading to complete system takeover, data exfiltration, or lateral movement within the network.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized data access by attackers who have obtained administrator credentials.

🟢

If Mitigated

Limited impact due to strong access controls, multi-factor authentication, and network segmentation preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials. Once authenticated, XSS payload execution is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Notification Center 2.1.0.3443, 1.9.2.3163, or 3.0.0.3466 and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-25-40

Restart Required: Yes

Instructions:

1. Log into QNAP NAS as administrator. 2. Open App Center. 3. Check for Notification Center updates. 4. Install the latest version (2.1.0.3443, 1.9.2.3163, or 3.0.0.3466+). 5. Restart the NAS if prompted.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit administrator accounts to only essential personnel and implement strong authentication controls.

Network Segmentation

all

Isolate QNAP devices from critical network segments to limit potential lateral movement.

🧯 If You Can't Patch

  • Implement strict access controls and multi-factor authentication for all administrator accounts
  • Monitor for suspicious administrator activity and implement web application firewall rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check Notification Center version in QNAP App Center. If version is below 2.1.0.3443, 1.9.2.3163, or 3.0.0.3466, the system is vulnerable.

Check Version:

ssh admin@qnap-ip 'cat /etc/config/uLinux.conf | grep notification_center_version' or check via QNAP web interface > App Center

Verify Fix Applied:

Confirm Notification Center version is 2.1.0.3443, 1.9.2.3163, 3.0.0.3466 or higher in App Center.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator login patterns
  • Suspicious JavaScript payloads in web logs
  • Multiple failed login attempts followed by successful admin login

Network Indicators:

  • Unexpected outbound connections from QNAP device after admin login
  • Traffic patterns suggesting data exfiltration

SIEM Query:

source="qnap_logs" AND (event="admin_login" OR event="xss_attempt")

🔗 References

📤 Share & Export