Taiwanese Network-attached storage (NAS) appliance maker QNAP announced that it is assessing the potential impact of two recently addressed flaws in OpenSSL on its products. The company also announced that it is working on security updates that address these vulnerabilities.
“An out-of-bounds read vulnerability in OpenSSL has been reported to affect QNAP NAS running QTS, QuTS hero, and QuTScloud. If exploited, the vulnerability allows remote attackers to disclose memory data or execute a denial-of-service (DoS) attack.” reads the advisory published by QNAP. “QNAP is thoroughly investigating the case. We will release security updates and provide further information as soon as possible.”
The CVE-2021-3711 is a high-severity buffer overflow flaw that could allow an attacker to change an application’s behavior or cause the app to crash. The vulnerability ties the decryption of SM2 encrypted data, the changes depend on the targeted application and data it maintains (i.e. credentials) in the heap while the issue is exploited.
The CVE-2021-3712 is a medium-severity vulnerability that can be exploited by attackers to trigger a denial-of-service (DoS) condition. The flaw could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext).
A few days ago, Taiwan vendor Synology also announced that the above vulnerabilities in the OpenSSL impact some of its products.
“Multiple vulnerabilities allow remote attackers to conduct denial-of-service attack or possibly execute arbitrary code via a susceptible version of Synology DiskStation Manager (DSM), Synology Router Manager (SRM), VPN Plus Server or VPN Server.” reads the advisory published by the company.
The affected Synology products are:
|PRODUCT||SEVERITY||FIXED RELEASE AVAILABILITY|
|VPN Plus Server||Important||Ongoing|
|[adrotate banner=”9″]||[adrotate banner=”12″]|
(SecurityAffairs – hacking, QNAP)