QNAP, the Taiwan-based maker of network-attached storage (NAS) appliances, this week announced the availability of patches for a couple of critical vulnerabilities in its QVR video management solution.
Tracked as CVE-2021-34348 and CVE-2021-34351 and featuring a CVSS score of 9.8, the vulnerabilities could be abused remotely to run arbitrary commands on affected systems.
Additionally, the manufacturer patched CVE-2021-34349 (CVSS score of 7.2), a high-severity issue that leads to arbitrary command execution as well.
Although all three security issues can be exploited remotely, CVE-2021-34349 requires for the attacker to have high privileges on the vulnerable system for successful exploitation. The critical-severity flaws require no privileges.
The vulnerabilities, QNAP notes in its advisory, only affect certain devices that have already reached their end-of-life (EOL) status and are no longer available for sale.
The company has patched these vulnerabilities with the release of QVR 5.1.5 build 20210803 and encourages users to update to this or later versions to ensure they are protected from potential attacks.
QNAP hasn’t mentioned any ongoing exploitation attempts targeting these vulnerabilities, but it’s not uncommon for malicious actors to start exploiting security holes in QNAP devices shortly after public disclosure.
QNAP QVR is a video surveillance solution that allows users to easily manage multiple servers and cameras at the same time, offering real-time surveillance, video recording and playback, and connection management capabilities.
Related: QNAP Urges Users to Secure Devices Against Brute-Force Attacks
Related: Files on QNAP NAS Devices Encrypted in Qlocker Ransomware Attacks

More from Ionut Arghire
- 500k Impacted by Data Breach at Debt Buyer NCB
- Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks
- Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data
- OpenAI Patches Account Takeover Vulnerabilities in ChatGPT
- New Wi-Fi Attack Allows Traffic Interception, Security Bypass
- Casino Giant Crown Resorts Investigating Ransomware Group’s Data Theft Claims
- Over 200 Organizations Targeted in Chinese Cyberespionage Campaign
- Nigerian BEC Scammer Sentenced to Prison in US
Latest News
- Anti-Bot Software Firm DataDome Banks $42M Financing
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 500k Impacted by Data Breach at Debt Buyer NCB
- Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks
- Why Endpoint Resilience Matters
- Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- UK Introduces Mass Surveillance With Online Safety Bill
