Critical .NET Vulnerability Lets Attacker Bypass Security in QNAP Backup Software

Critical .NET Vulnerability Lets Attacker Bypass Security in QNAP Backup Software

Microsoft has unveiled a critical vulnerability in ASP.NET Core that could enable attackers to sidestep essential security measures.

Disclosed on October 24, 2025, under CVE-2025-55315, this flaw stems from HTTP Request Smuggling (CWE-444) and poses risks to systems relying on outdated .NET components.

QNAP, a leading provider of network-attached storage solutions, has issued urgent guidance, emphasizing the need for immediate updates to mitigate potential exploits.

The vulnerability affects ASP.NET Core, a foundational framework for web applications, allowing authenticated attackers to craft malicious HTTP requests.

Successful exploitation could lead to unauthorized access to sensitive data, server file modifications, or even limited denial-of-service disruptions.

While the severity is rated as “Important” by Microsoft, the implications extend to QNAP’s ecosystem, particularly the NetBak PC Agent software, which integrates these .NET components during installation.

google

Technical Details And Affected Systems

NetBak PC Agent, designed for seamless backups from Windows PCs to QNAP NAS devices, automatically installs Microsoft ASP.NET Core runtimes.

If users have not applied recent patches, their systems remain exposed. The flaw exploits ambiguities in HTTP request parsing, enabling attackers to inject smuggling payloads that bypass authentication and authorization controls.

QNAP’s investigation is ongoing, but the company confirms that unpatched installations of NetBak PC Agent on Windows systems are at risk.

This includes versions prior to the latest updates, where ASP.NET Core versions below 8.0.21 harbor the vulnerability.

Attackers need authenticated access, lowering the barrier for insiders or those with compromised credentials, but the potential for data exfiltration or tampering underscores the urgency.

CVE ID Affected Product CVSS Score Description Impact
CVE-2025-55315 NetBak PC Agent (via ASP.NET Core) 7.5 (Important) HTTP Request Smuggling in ASP.NET Core allowing bypass of security controls Unauthorized data access, file modification, limited DoS

Microsoft’s patch addresses the parsing issue in the framework’s request handling, but QNAP users must act to ensure compatibility.

Mitigation Steps

QNAP urges all users to verify and update their systems promptly. The simplest approach involves reinstalling NetBak PC Agent: uninstall the current version via Windows Settings > Apps > Installed Apps, then download the latest installer from QNAP’s official site.

This process automatically fetches and installs the updated ASP.NET Core 8.0.21 runtime.

For those preferring manual intervention, head to dotnet.microsoft.com/en-us/download/dotnet/8.0 and install the latest ASP.NET Core Runtime Hosting Bundle.

Restart the application or system afterward to apply changes. QNAP also recommends monitoring for unusual network activity and enabling multi-factor authentication on NAS devices.

As cybersecurity threats evolve, this incident highlights the interconnected risks in software supply chains. Organizations should prioritize regular patching to safeguard against such bypass vulnerabilities.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link