A new vulnerability has been disclosed for the QTS operating system used by QNAP storage devices. This vulnerability allows unauthenticated remote OSX users to potentially read and write arbitrary files on a QNAP device through the Apple Filing Protocol (AFP). As AFP is disabled by default, this vulnerability would only affect users who have enabled this protocol. This vulnerability exists in firmware prior to 4.1.4 Build 0910 and 4.2.0 RC2 (Build 0910) and if you are using an affected version, you should immediately upgrade to the latest version. 

To upgrade your QNAP device to the latest version, you can go to this page to download the latest QTS 4.2 release candidate which also includes other security vulnerability fixes. QNAP has a guide on how to upgrade the QTS firmware on your QNAP device here:

How to update your QNAP NAS’s firmware

Related Articles:

Critical bug in EoL D-Link NAS devices now exploited in attacks

D-Link won’t fix critical flaw affecting 60,000 older NAS devices

Exploit released for new Windows Server "WinReg" NTLM Relay attack

Palo Alto Networks warns of firewall hijack bugs with public exploit

Critical Ivanti RCE flaw with public exploit now used in attacks