CVE-2025-54169

6.5 MEDIUM

📋 TL;DR

An out-of-bounds read vulnerability in QNAP File Station 5 allows authenticated remote attackers to read sensitive memory contents. This affects users with access to File Station 5 who haven't updated to the patched version. Attackers need valid user credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • QNAP File Station 5
Versions: Versions before 5.5.6.5068
Operating Systems: QTS, QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have a valid user account with File Station access

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker obtains sensitive data like passwords, encryption keys, or other secrets stored in memory, potentially leading to full system compromise.

🟠

Likely Case

Attacker reads limited sensitive information from memory, potentially exposing some confidential data but not full system control.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users only accessing their own data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access; out-of-bounds read vulnerabilities typically require specific conditions to trigger

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.6.5068 and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-26-03

Restart Required: Yes

Instructions:

1. Log into QNAP App Center
2. Check for updates to File Station 5
3. Update to version 5.5.6.5068 or later
4. Restart File Station service

🔧 Temporary Workarounds

Disable File Station

all

Temporarily disable File Station if not needed

Log into QTS > Control Panel > Applications > File Station > Disable

Restrict Network Access

all

Limit File Station access to trusted networks only

Configure firewall rules to restrict access to File Station ports

🧯 If You Can't Patch

  • Implement strict access controls and limit user accounts with File Station access
  • Monitor File Station logs for unusual access patterns or data extraction attempts

🔍 How to Verify

Check if Vulnerable:

Check File Station version in QNAP App Center or via SSH: cat /etc/config/uLinux.conf | grep FileStation

Check Version:

cat /etc/config/uLinux.conf | grep FileStation

Verify Fix Applied:

Verify File Station version is 5.5.6.5068 or higher in App Center

📡 Detection & Monitoring

Log Indicators:

  • Unusual File Station access patterns
  • Multiple failed authentication attempts followed by successful login
  • Large data reads from File Station

Network Indicators:

  • Unusual traffic to File Station ports
  • Repeated requests to specific File Station endpoints

SIEM Query:

source="qnap" AND (app="FileStation" AND (event="access" OR event="error")) | stats count by src_ip, user

🔗 References

📤 Share & Export