Just stumbled across this article. This passage in particular caught my eye:
The NAS that Dolby offers for use with the IMS3000 for use cases where more local storage is needed than 3 x Dolby-approved drives in the internal RAID can provide is a QNAP model. Where this is relevant to the security concerns mentioned above is that the software customization Dolby adds to it means that these machines are stuck on a pretty old version of the base firmware: you can't upgrade it to current, because doing so will break the Dolby customization, and thus its ability to stream audio and video into the IMS3000.
So it appears that there is no way to avoid leaving this device in a vulnerable condition, especially if it has a gateway specified in the IPv4 settings, and access to the Internet. So the takeaway is that we need to flag up to customers for whom we install the IMS3000 with NAS option that they need either to leave it completely disconnected from the Internet, or have enterprise grade firewall and malware protection between it and the Internet.
QNAP's firmware push was intended, in part, to cover recent security vulnerabilities in their devices. QNAP devices are a rich and frequent target of criminal hackers. A severe vulnerability from February 2023 allowed for remote SQL injections and potential administrative control of a device, affecting nearly 30,000 devices seen in network scans. It was a follow-on from attacks by DeadBolt, a ransomware gang that infected thousands of QNAP devices and cornered QNAP into automatically pushing emergency updates, even to customers with automatic updates turned off.
Security researchers at WatchTowr said they found 15 vulnerabilities in QNAP's operating systems and cloud services and informed the company of them. After QNAP failed to patch some of those vulnerabilities far beyond the typical 90-day window (and then some), WatchTowr went public with its findings, dubbed "QNAPping at the Wheel."
Security researchers at WatchTowr said they found 15 vulnerabilities in QNAP's operating systems and cloud services and informed the company of them. After QNAP failed to patch some of those vulnerabilities far beyond the typical 90-day window (and then some), WatchTowr went public with its findings, dubbed "QNAPping at the Wheel."
So it appears that there is no way to avoid leaving this device in a vulnerable condition, especially if it has a gateway specified in the IPv4 settings, and access to the Internet. So the takeaway is that we need to flag up to customers for whom we install the IMS3000 with NAS option that they need either to leave it completely disconnected from the Internet, or have enterprise grade firewall and malware protection between it and the Internet.
Comment