Truenas Vulnerable: Hackers Exploit Weakness

At the Pwn2own Ireland 2024 event, researchers uncovered vulnerabilities in a variety of popular devices, such as NAS systems, cameras, and other connected devices. One notable discovery was the presence of multiple dangerous vulnerabilities in Truenas products in their standard configuration.

During the competition, hacker teams successfully targeted Truenas Mini X devices, highlighting the risks associated with vulnerabilities in network infrastructure. The Viettel Cyber ​​Security team stood out, earning $50,000 and 10 points of Master of PWN by leveraging SQL and authentication flaws in the Qnap router and Truenas device.

Another team, Computer Sector 7, managed to exploit four vulnerabilities on Qnap and Truenas Mini X devices. The identified issues included SQL infections, authentication bypasses, incorrect certificates, privilege escalation exploits, and the use of poorly coded cryptographic keys.

In response to the competition results, Truenas has released recommendations for users and stressed the importance of adhering to security protocols. The company pointed out that the vulnerabilities affect devices in their default configuration without additional protection.

Users are advised to review the guidelines and implement optimal security practices to mitigate risks until updates are available. These proactive measures will significantly hinder attackers in exploiting vulnerabilities.

Truenas specifically highlights the necessity of enhancing NAS device configurations, including proper certificate setup and the use of unique keys. Adhering to these recommendations reduces the chances of successful attacks.

The participants of PWN2OWN illustrated the critical role of security in today’s interconnected world, where vulnerable network devices can have far-reaching consequences. Competitions like these motivate developers to enhance their systems and swiftly address vulnerabilities.

/Reports, release notes, official announcements.