轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-200-202603-00000014
[內容說明]
研究人員發現QNAP作業系統存在連結追蹤(Link Following)漏洞(CVE-2025-66277),未經身分鑑別之遠端攻擊者可利用此漏洞存取未授權之檔案系統路徑,請儘速確認並進行修補。
[影響平台]
QTS 5.2.x至5.2.8.3350 build 20251216(不含)版本
QuTS hero h5.2.x至h5.2.8.3350 build 20251216(不含)版本
[建議措施]
官方已針對漏洞釋出修復更新,請參考官方說明進行更新,網址如下: https://www.qnap.com/en/security-advisory/qsa-26-05
[參考資料]
1. https://nvd.nist.gov/vuln/detail/CVE-2025-66277
Forwarded from National Cybersecurity Information Sharing and Analysis Center: Cybersecurity Alert NISAC-200-202603-00000014
[Content Description]
Researchers have discovered a link following vulnerability (CVE-2025-66277) in the QNAP operating system. Unauthenticated remote attackers could exploit this vulnerability to access unauthorized file system paths. Please confirm and patch it as soon as possible.
[Affected Platforms]
QTS versions 5.2.x to 5.2.8.3350 build 20251216 (excluding)
QTS hero versions h5.2.x to h5.2.8.3350 build 20251216 (excluding)
[Recommended Actions]
The official patch has been released. Please refer to the official instructions for updating. The URL is as follows: https://www.qnap.com/en/security-advisory/qsa-26-05
[References]
1. https://nvd.nist.gov/vuln/detail/CVE-2025-66277