Qnap patches a batch of Pwn2Own 2025 security vulnerabilities

Qnap's NAS systems were the target of several attacks at this year's Pwn2Own event. Updates are closing the identified vulnerabilities.

listen Print view
Server hardware

(Image: Konstantin Yolshin/Shutterstock.com)

3 min. read

Qnap released a total of eleven security advisories over the weekend, addressing partly critical vulnerabilities in its NAS systems and associated software. Updates for these advisories are already available for download and installation – users of Qnap systems should check if their devices are up to date.

Details about the vulnerabilities are scarce – even the CVE entries have not yet been published. However, Qnap has patched three security gaps in QTS and QuTS hero, which were exploited as zero-day vulnerabilities at Pwn2Own 2025 in Ireland to attack NAS storage devices (CVE-2025-62847, CVE-2025-62848, CVE-2025-62849). An attack vector with a CVSS score is still missing, but Qnap classifies the risk as "critical". The fixes are included in QTS 5.2.7.3297 Build 20251024, QuTS hero h5.2.7.3297 Build 20251024, and QuTS hero h5.3.1.3292 Build 20251024, and newer versions.

Further critical vulnerabilities can be found in Hyper Data Protector (CVE-2025-59389), which version 2.2.4.1 and newer will fix, or in HBS 3 Hybrid Backup Sync (CVE-2025-62840, CVE-2025-62842), where version 26.2.0.938 or newer resolves the issue.

However, Qnap is also addressing other vulnerabilities not found at Pwn2Own. For example, an SQL injection vulnerability rated as a critical risk in QuMagie before 2.7.0, which allowed attackers from the network to execute malicious code (CVE-2025-52425).

Videos by heise

Further security advisories from the weekend address security leaks that Qnap developers classify as less severe:

Most recently, Qnap reported high-risk security vulnerabilities in QTS and QuTS hero in September. At that time, the updates that fixed the issues had already been available for some time.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.