Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

APP:MISC:QNAP-TRANSCODE-CI

Severity

Major

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

QNAP Transcode Server Command Injection

Release Date

2018/06/05

Update Number

3070

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

APP: QNAP Transcode Server Command Injection


This signature detects attempts to exploit a known vulnerability against QNAP Transcode Server. A successful exploit can lead to remote code execution.

Extended Description

QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack.

Affected Products

  • Qnap qts 4.2.0
  • Qnap qts 4.2.1
  • Qnap qts 4.2.2
  • Qnap qts 4.2.3
  • Qnap qts 4.2.4
  • Qnap qts 4.2.6
  • Qnap qts 4.3.1.0013
  • Qnap qts 4.3.1.0023
  • Qnap qts 4.3.2.0050
  • Qnap qts 4.3.2.0060
  • Qnap qts 4.3.2.0144
  • Qnap qts 4.3.3
  • Qnap qts 4.3.3.0095
  • Qnap qts 4.3.3.0096
  • Qnap qts 4.3.3.0136
  • Qnap qts 4.3.3.0154
  • Qnap qts 4.3.3.0188
  • Qnap qts 4.3.3.0210
  • Qnap qts 4.3.3.0229
  • Qnap qts 4.3.3.0238
  • Qnap qts 4.3.3.0262
  • Qnap qts 4.3.3.0299

References

  • CVE: CVE-2017-13067
  • URL: http://docs.qnap.com/nas/4.1/Home/en/index.html?transcode_management.htm

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out