Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2026/VULN098
_____________________________________________________________________

DATE                : 30/01/2026

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running qnap QTS versions prior to 5.2.x.

=====================================================================
https://www.qnap.com/go/security-advisory/qsa-25-56
_____________________________________________________________________


Security ID : QSA-25-56
Vulnerability in legacy QTS with NFS service enabled

    Release date : January 17, 2026

    CVE identifier : CVE-2025-66276

    Affected products: QTS 4.3.x

Severity
Moderate

Status
Resolved


Summary

A vulnerability has been reported to affect certain legacy QTS 
environments utilizing the NFS (Network File System) service. If 
exploited, the vulnerability allows attackers to perform actions and 
potentially gain access due to the misconfiguration of NFS settings.

  

We have already fixed the vulnerability in the following version:

Affected Product 	Fixed Version

QTS 4.3.x 	QTS 5.2.x and later


Recommendation

To secure your device, we recommend regularly updating your system to 
the latest version to benefit from vulnerability fixes. You can check 
the product support status to see the latest updates available to your 
NAS model.


We also recommend strengthening NFS access control for your shared 
folders.


Updating QTS

    Log in to QTS as an administrator.
    Go to Control Panel > System > Firmware Update.
    Under Live Update, click Check for Update.
    The system downloads and installs the latest available update.

Tip: You can also download the update from the QNAP website. Go to 
Support > Download Center and then perform a manual update for your 
specific device.


Strengthing NFS Access Control for Shared Folders

We recommend reviewing and adjusting the NFS permission settings Host 
/ IP / Network and Squash Option for all affected shared folders. The 
following steps will help you further strengthen NFS access control 
and mitigate security risks caused by improper configuration.

    Log in to QTS as an administrator.
    Go to Control Panel > Privilege > Shared Folders > Shared Folder.
    Identify a shared folder.
    Under Action, click the Edit Shared Folder Permission icon.
    The Edit Shared Folder Permission window opens.
    Next to Select permission type, select NFS host access.
    Select Access right.
    Under Host / IP / Network, replace the wildcard value * with a 
specific IP address or domain name.
    This ensures only specific IP addresses or domain names can access 
the shared folder via NFS.
    Tip: To specify additional IP addresses or domain names, click Add.
    For each entry, under Squash Option, select Squash all users.
    This enforces stricter access control and minimizes the risk of 
unauthorized privilege usage.
    Click Apply.
    The system saves the shared folder permission settings.
    Repeat the above steps to configure the NFS settings for 
additional shared folders.

  

Attachment

    CVE-2025-66276.json

Acknowledgements: Víctor A. Morales

Revision History: V1.0 (January 17, 2026) - Published


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




