Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

QNAP Addresses Seven Exploited Zero-Day Vulnerabilities Explored at Pwn2Own Ireland 2025


QNAP has addressed seven zero-day vulnerabilities that were recently discovered by security researchers at Pwn2Own Ireland 2025. The vulnerabilities are now fixed in the latest versions of QNAP's software, including its Hyper Data Protector, Malware Remover, HBS 3 Hybrid Backup Sync, and other applications.

  • QNAP has addressed seven zero-day vulnerabilities that were recently exploited during the Pwn2Own Ireland 2025 competition.
  • The vulnerabilities affected various applications, including Hyper Data Protector, Malware Remover, and HBS 3 Hybrid Backup Sync.
  • QNAP has released updated software versions to fix identified vulnerabilities.
  • Users who continue to use older versions of QNAP's software are advised to apply the updates as soon as possible.
  • Updating system and changing passwords can help protect against potential future attacks and unauthorized access.



  • QNAP, a leading provider of network-attached storage (NAS) solutions, has taken proactive steps to address seven zero-day vulnerabilities that were recently exploited during the Pwn2Own Ireland 2025 competition. The security breaches, which involved multiple teams of security researchers and hackers, exposed several critical flaws in QNAP's software and operating systems, including the Hyper Data Protector, Malware Remover, HBS 3 Hybrid Backup Sync, QTS, QuTS hero, and other applications.

    According to QNAP, the vulnerabilities were demonstrated by various teams at Pwn2Own Ireland 2025, including the Summoning Team, DEVCORE, Team DDOS, and a CyCraft technology intern. The security bugs that were targeted during this event have been assigned the following CVE numbers: CVE-2025-62847, CVE-2025-62848, CVE-2025-62849, CVE-2025-59389, CVE-2025-11837, CVE-2025-62840, and CVE-2025-62842. These exploits were designed to allow attackers to gain unauthorized access to QNAP devices, potentially resulting in data breaches, loss of system control, or other malicious activities.

    In response to these findings, QNAP has released updated software versions that address the identified vulnerabilities. These patches include fixes for both the operating systems and various applications managed by the company. It is essential for users who continue to use older versions of QNAP's software to ensure they apply these updates as soon as possible.

    In a statement released along with the advisories, QNAP expressed concern about the recently discovered security vulnerabilities and urged users to take immediate action to secure their devices. The advice given to users is straightforward: updating their system to the latest version will help to fix known bugs and protect against potential future attacks. To accomplish this, users need to go through an update process that includes running a firmware update and potentially upgrading specific applications.

    Additionally, QNAP recommended that users change all passwords after applying these security patches, as part of broader efforts aimed at enhancing the overall security posture of its products. This is in line with best practices for securing networked devices, where password updates play an essential role in protecting against both local and remote access breaches.

    The release of this information serves as a reminder that software vendors, especially those managing critical infrastructure components like NAS systems, must remain vigilant about the evolving threat landscape. Zero-day exploits represent a particularly significant challenge because they involve previously unknown vulnerabilities, which can bypass standard defenses more effectively than zero-day attacks with known exploit mechanisms.

    QNAP's proactive approach in addressing and disclosing these newly discovered security flaws highlights its commitment to user protection and adherence to responsible disclosure practices. By providing detailed information about the vulnerabilities that were identified during Pwn2Own Ireland 2025, QNAP is taking an important step towards improving the overall security posture of its products.

    This move also underscores the broader importance of collaboration between vendors and security researchers in maintaining a strong cybersecurity ecosystem. The recent discovery at Pwn2Own Ireland 2025 exemplifies how such partnerships can help identify and address potential vulnerabilities before they reach the wider community.

    Overall, QNAP's actions are a prime example of the kind of swift action that can be taken by organizations in response to newly discovered security threats. By taking proactive steps to secure their software and operating systems, vendors like QNAP play an essential role in safeguarding user data and preventing unauthorized access to networked devices.

    For individuals who rely on QNAP's products for data storage, backup, or other critical functions, it is highly recommended that they upgrade to the latest versions of these applications as soon as possible. Taking proactive steps like changing passwords also helps reinforce overall security posture, reducing the risk of potential breaches or unauthorized access to systems.

    By staying informed about recent discoveries and updates from vendors like QNAP, users can take an active role in safeguarding their data and digital assets against emerging threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/QNAP-Addresses-Seven-Exploited-Zero-Day-Vulnerabilities-Explored-at-Pwn2Own-Ireland-2025-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/qnap-fixes-seven-nas-zero-day-vulnerabilities-exploited-at-pwn2own/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-62847

  • https://www.cvedetails.com/cve/CVE-2025-62847/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-62848

  • https://www.cvedetails.com/cve/CVE-2025-62848/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-62849

  • https://www.cvedetails.com/cve/CVE-2025-62849/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-59389

  • https://www.cvedetails.com/cve/CVE-2025-59389/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-11837

  • https://www.cvedetails.com/cve/CVE-2025-11837/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-62840

  • https://www.cvedetails.com/cve/CVE-2025-62840/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-62842

  • https://www.cvedetails.com/cve/CVE-2025-62842/


  • Published: Sat Nov 8 05:23:25 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us