All these stories about QNAP (etc.) make me glad that I build my own servers, 
rather than getting some easy-to-setup, but non-upgradable, box. (E.g., I'm 
running 0.103.2, at the minor cost of having to build it from source.)


On Thu, 6 May 2021 13:18:20 +0100 (BST)
"G.W. Haywood via clamav-users" <clamav-users@lists.clamav.net> wrote:

> Hi there,
> 
> On Thu, 6 May 2021, Matus UHLAR - fantomas wrote:
> > On 06.05.21 12:19, Chellini Stefano via clamav-users wrote:  
> >> My QNAP NAS It is EOL , it is TS419-PII
> >> 
> >> Is it available an option to upgrade the antivirus on it ?  
> >
> > it should be installable through entware package, but as it only has 512MB
> > of RAM, it's largely useless there (may not work properly).  
> 
> QNAP devices have been mentioned several times on this list recently.
> 
> A very little searching will reveal why.
> 
> There seems to be little doubt that the responses to the reports by
> researchers of critical vulnerabilities have left much to be desired:
> 
> https://securingsam.com/new-vulnerabilities-allow-complete-takeover/
> https://portswigger.net/daily-swig/qnap-fixes-critical-rce-vulnerabilities-in-nas-devices
> https://www.zdnet.com/article/hundreds-of-thousands-of-qnap-devices-vulnerable-to-remote-takeover-attacks/
> 
> If you own one of these devices, I guess that these blog posts make
> uncomfortable reading.
> 
> Even if it would be capable of running ClamAV, installing it on any
> vulnerable device would be pointless; this would not magically make
> the device any less vulnerable.  The vulnerabilities can only be fixed
> by security patches or upgrades, or perhaps by some serious hacking
> which is likely to be well beyond the average user.
> 
> My view is that given their dubious history, QNAP devices should be
> taken out of service unless they're in environments protected by
> people who *really* know what they're doing - people who can create a
> demonstrably safe firewall configuration.  Again well beyond average.
> 
> Otherwise, these things are just compromises waiting to happen.
> 
> They're powerful enough to be attractive targets.  They're easy enough
> to find.  Even when up to date with patches, next time around we'll
> probably see the same unsatisfactory response leave more low-hanging
> fruit for the criminals.  They represent risk not just to their users,
> but, after they're taken over for use as part of the extensive and
> ever-growing criminal infrastructure, to the rest of us as well.
> 
> Do us all a favour and get rid of them.
> 

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to