
close
close
QNAP, a company specializing in developing networking solutions, has issued an advisory about a new Linux vulnerability that affects most of its Network Attached Storage (NAS) devices. The company warned that this high severity Linux exploit called “Dirty Pipe” could be abused by attackers to gain root privileges on affected systems.
The Dirty Pipe vulnerability, tracked as CVE-2022-0847, was discovered by a security researcher by Max Kellermann back in April 2021. It allows non-privileged users to overwrite data in arbitrary read-only files, leading to local privilege escalation. The attacker can exploit this vulnerability to carry out various malicious actions such as creating unauthorized user accounts, installing backdoors, injecting code into scripts, and altering binaries used by privileged apps or services.
Essentially, the security vulnerability resides in a Linux mechanism called pipeline, which the OS uses for unidirectional communication between processes. The flaw has since been fixed in the latest Linux kernel versions, but it could potentially target devices running Linux kernel version 5.8 or newer.
QNAP says that the Dirty Pipe exploit affects all devices running QTS 5.0.x and QuTS hero h5.0.x, and you can check out the full list of all affected models in the release notes for Kernel Version 5.10.60.
Sponsored Content
Centralize, Manage and Secure Remote Connections
Centralized remote connection technologies, remote machine data, password management and access control on a platform that is secure, scalable and refreshingly simple to use.
Learn More
“If exploited, this vulnerability allows an unprivileged user to gain administrator privileges and inject malicious code,” QNAP explained in a security advisory. “Currently there is no mitigation available for this vulnerability. We recommend users to check back and install security updates as soon as they become available.”
The company has advised all users to wait for its security patches that should help to mitigate the vulnerability on Network Attached Storage (NAS) devices. Meanwhile, it recommends that users with Internet-exposed NAS devices should disable the “Port Forwarding function of the router” and the “UPnP function of the QNAP NAS,” at least until a fix is available.
More in Security
Microsoft Defender Vulnerability Management Adds New CVE Reporting Feature
Jun 30, 2022 | Rabia Noureen
Microsoft Releases Patches to Address Azure FabricScape Flaw Affecting Linux Workloads
Jun 29, 2022 | Rabia Noureen
Microsoft Defender for Identity Can Now Detect Insecure Domain Configurations
Jun 27, 2022 | Rabia Noureen
QNAP Releases Patch to Fix PHP Security Flaw Affecting Select NAS Devices
Jun 23, 2022 | Rabia Noureen
Microsoft Unveils New Edge Secured-Core IoT Devices to Block Firmware Attacks
Jun 22, 2022 | Rabia Noureen
Most popular on petri