QNAP, a Taiwan-based networking hardware company, released a security advisory to warn about a critical security vulnerability residing in QTS and QuTS OS, which allows remote attackers to inject malicious code into QNAP NAS devices. The fixed critical vulnerability, tracked as CVE-2022-27596 and having a rating of 9.8 CVSS score, is found to be in the QNAP devices running QTS 5.0.1 and QuTS hero h5.0.1 versions of the operating system, which allows a remote attacker to inject malicious code. According to NIST, it is a SQL injection flaw where an attacker sending a specially crafted request to vulnerable devices changes the legitimate SQL queries to perform unexpected behavior. In addition, QNAP released a JSON file that describes the severity of the vulnerability, indicating that it could be exploited in low-complexity attacks by remote hackers, without requiring user interaction or privileges on the targeted device. Currently, the vulnerability has not been exploited in the wild but users are recommended to apply available security updates as soon as possible as threat actors actively targeted QNAP Devices, as per QNAP. Additionally, QNAP asked users to update the QTS devices to 5.0.1.2234 build 20221201 and later version, and QuTS hero to h5.0.1.2248 build 20221215 and later version.
A critical security flaw in Oracle WebLogic Server has rapidly become a prime target for attackers worldwide. Identified as CVE-2026-21962, the issue carries the highest possible s...
A new Windows malware called ResokerRAT has been discovered, which allows attackers to secretly control infected systems. This malware uses Telegram instead of traditional servers ...
A vulnerability has been identified in Google Cloud’s Vertex AI platform that could allow unauthorized users to access sensitive data associated with machine learning workloads. ...