QNAP, the Taiwan-based maker of network-attached storage (NAS) appliances, this week announced the availability of patches for a couple of critical vulnerabilities in its QVR video management solution.
Tracked as CVE-2021-34348 and CVE-2021-34351 and featuring a CVSS score of 9.8, the vulnerabilities could be abused remotely to run arbitrary commands on affected systems.
Additionally, the manufacturer patched CVE-2021-34349 (CVSS score of 7.2), a high-severity issue that leads to arbitrary command execution as well.
Although all three security issues can be exploited remotely, CVE-2021-34349 requires for the attacker to have high privileges on the vulnerable system for successful exploitation. The critical-severity flaws require no privileges.
The vulnerabilities, QNAP notes in its advisory, only affect certain devices that have already reached their end-of-life (EOL) status and are no longer available for sale.
The company has patched these vulnerabilities with the release of QVR 5.1.5 build 20210803 and encourages users to update to this or later versions to ensure they are protected from potential attacks.
QNAP hasn’t mentioned any ongoing exploitation attempts targeting these vulnerabilities, but it’s not uncommon for malicious actors to start exploiting security holes in QNAP devices shortly after public disclosure.
QNAP QVR is a video surveillance solution that allows users to easily manage multiple servers and cameras at the same time, offering real-time surveillance, video recording and playback, and connection management capabilities.