CVE-2025-62854

6.5 MEDIUM

📋 TL;DR

An uncontrolled resource consumption vulnerability in QNAP File Station 5 allows authenticated remote attackers to cause denial-of-service conditions. This affects users running vulnerable versions of File Station 5 on QNAP NAS devices. Attackers need valid user credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • QNAP File Station 5
Versions: Versions prior to 5.5.6.5190
Operating Systems: QTS (QNAP Turbo NAS Operating System)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires File Station 5 to be enabled and accessible. QNAP NAS devices with File Station 5 installed are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of File Station functionality, potentially affecting file access and management services on the QNAP device.

🟠

Likely Case

Degraded performance or temporary unavailability of File Station services until resource consumption subsides.

🟢

If Mitigated

Minimal impact with proper authentication controls and monitoring in place to detect abnormal resource usage.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed File Station interfaces could be targeted by attackers with compromised credentials.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials could disrupt file services affecting business operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials. The vulnerability involves resource consumption which typically doesn't require complex exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: File Station 5 version 5.5.6.5190 or later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-26-03

Restart Required: Yes

Instructions:

1. Log into QNAP NAS web interface. 2. Go to App Center. 3. Check for updates for File Station 5. 4. Install version 5.5.6.5190 or later. 5. Restart File Station service or reboot the NAS if required.

🔧 Temporary Workarounds

Disable File Station 5

all

Temporarily disable File Station 5 if not required for operations

Log into QNAP web interface > App Center > File Station 5 > Disable

Restrict Access

all

Limit File Station access to trusted networks only

Control Panel > Network & File Services > Win/Mac/NFS > Configure access restrictions

🧯 If You Can't Patch

  • Implement strict authentication controls and monitor for credential compromise
  • Deploy resource monitoring and alerting for abnormal File Station resource consumption

🔍 How to Verify

Check if Vulnerable:

Check File Station version in QNAP App Center. If version is earlier than 5.5.6.5190, the system is vulnerable.

Check Version:

Log into QNAP web interface > App Center > File Station 5 > Check version information

Verify Fix Applied:

Verify File Station version shows 5.5.6.5190 or later in App Center after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual high resource consumption by File Station processes
  • Multiple failed authentication attempts followed by successful login and resource spikes

Network Indicators:

  • Abnormal traffic patterns to File Station service ports
  • Repeated resource-intensive requests to File Station endpoints

SIEM Query:

source="qnap_nas" AND (process="filestation" OR service="File Station") AND (cpu_usage>90 OR memory_usage>90)

🔗 References

📤 Share & Export