INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 3h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 3h Global phishing Multiple sectors HIGH 4h Global insider Cybersecurity Services CRITICAL 4h Global ransomware Multiple sectors (U.S. companies) CRITICAL 4h Global malware Financial Services, Cryptocurrency CRITICAL 4h Global malware Technology and Cloud Services HIGH 4h Global general Financial Services and E-commerce MEDIUM 4h Global data_breach Social Media and Communications CRITICAL 5h Global general Cybersecurity Operations HIGH 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 3h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 3h Global phishing Multiple sectors HIGH 4h Global insider Cybersecurity Services CRITICAL 4h Global ransomware Multiple sectors (U.S. companies) CRITICAL 4h Global malware Financial Services, Cryptocurrency CRITICAL 4h Global malware Technology and Cloud Services HIGH 4h Global general Financial Services and E-commerce MEDIUM 4h Global data_breach Social Media and Communications CRITICAL 5h Global general Cybersecurity Operations HIGH 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 3h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 3h Global phishing Multiple sectors HIGH 4h Global insider Cybersecurity Services CRITICAL 4h Global ransomware Multiple sectors (U.S. companies) CRITICAL 4h Global malware Financial Services, Cryptocurrency CRITICAL 4h Global malware Technology and Cloud Services HIGH 4h Global general Financial Services and E-commerce MEDIUM 4h Global data_breach Social Media and Communications CRITICAL 5h Global general Cybersecurity Operations HIGH 5h
Vulnerabilities

CVE-2019-7195

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
QNAP Photo Station Path Traversal Vulnerability — QNAP devices running Photo Station contain an external control of file name or path vulnerability allowing remote attackers to access or modify system
Published: Jun 8, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

QNAP Photo Station Path Traversal Vulnerability — QNAP devices running Photo Station contain an external control of file name or path vulnerability allowing remote attackers to access or modify system files.

🤖 AI Executive Summary

CVE-2019-7195 is a critical path traversal vulnerability in QNAP Photo Station that allows remote attackers to access or modify arbitrary system files without authentication. With a CVSS score of 9.0 and a confirmed public exploit, this vulnerability poses an immediate and severe risk to any organization running QNAP NAS devices with Photo Station enabled. Attackers can leverage this flaw to exfiltrate sensitive data, plant malware, or pivot deeper into internal networks. The combination of exploit availability and patch availability makes immediate remediation non-negotiable.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 16, 2026 07:56
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations across multiple critical sectors are at significant risk. Government entities and ministries using QNAP NAS for document storage and archiving face data exfiltration threats that could violate NCA regulations. Healthcare organizations storing patient records on QNAP devices risk PDPL compliance breaches. Energy sector companies including ARAMCO subsidiaries and NEOM project infrastructure using QNAP for operational data storage face potential sabotage or espionage. Banking and financial institutions under SAMA oversight risk exposure of sensitive financial records. SMEs and educational institutions, which widely deploy QNAP NAS as cost-effective storage solutions in Saudi Arabia, are particularly exposed due to limited security monitoring capabilities. Telecom providers like STC using QNAP for internal file sharing also face elevated risk.
🏢 Affected Saudi Sectors
Government Healthcare Energy Banking Education Telecom Manufacturing Retail
⚖️ Saudi Risk Score (AI)
9.1
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (within 24 hours):
1. Identify all QNAP NAS devices running Photo Station across the environment using asset inventory tools.
2. Disable Photo Station application immediately on all internet-facing QNAP devices if patching cannot be done immediately.
3. Block external access to QNAP management interfaces (ports 80, 443, 8080, 8081) at the perimeter firewall.
4. Isolate affected QNAP devices from sensitive network segments.

PATCHING GUIDANCE:
5. Update QNAP QTS firmware to the latest available version via QNAP Security Advisory QSA-19-11.
6. Update Photo Station to version 6.0.3 or later (for QTS 4.3.x) or the corresponding patched version for your firmware branch.
7. Verify patch integrity after installation and confirm Photo Station version via QNAP App Center.

COMPENSATING CONTROLS (if patching is delayed):
8. Implement strict network ACLs to allow Photo Station access only from trusted internal IP ranges.
9. Deploy a Web Application Firewall (WAF) rule to block path traversal patterns (e.g., ../, ..\, %2e%2e) targeting QNAP endpoints.
10. Enable QNAP's built-in IP blocking and failed login protection features.

DETECTION RULES:
11. Monitor web server logs for path traversal patterns: requests containing '../', '%2e%2e%2f', or '%252e' targeting Photo Station URLs.
12. Create SIEM alerts for unusual file access patterns on QNAP devices, especially access to /etc/passwd, /etc/shadow, or configuration files.
13. Deploy network IDS signatures for QNAP Photo Station path traversal exploitation attempts.
14. Review QNAP access logs for anomalous GET/POST requests with encoded traversal sequences.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (خلال 24 ساعة):
1. تحديد جميع أجهزة QNAP NAS التي تشغّل Photo Station في البيئة باستخدام أدوات جرد الأصول.
2. تعطيل تطبيق Photo Station فوراً على جميع أجهزة QNAP المتصلة بالإنترنت إذا تعذّر التصحيح الفوري.
3. حجب الوصول الخارجي إلى واجهات إدارة QNAP (المنافذ 80 و443 و8080 و8081) على جدار الحماية الحدودي.
4. عزل أجهزة QNAP المتأثرة عن قطاعات الشبكة الحساسة.

إرشادات التصحيح:
5. تحديث برنامج QNAP QTS الثابت إلى أحدث إصدار متاح وفق النشرة الأمنية QSA-19-11.
6. تحديث Photo Station إلى الإصدار 6.0.3 أو أحدث (لـ QTS 4.3.x) أو الإصدار المُصحَّح المقابل لفرع البرنامج الثابت لديك.
7. التحقق من سلامة التصحيح بعد التثبيت وتأكيد إصدار Photo Station عبر QNAP App Center.

ضوابط التعويض (في حال تأخر التصحيح):
8. تطبيق قوائم تحكم صارمة بالشبكة للسماح بالوصول إلى Photo Station من نطاقات IP الداخلية الموثوقة فقط.
9. نشر قاعدة جدار حماية تطبيقات الويب (WAF) لحجب أنماط اجتياز المسار التي تستهدف نقاط نهاية QNAP.
10. تفعيل ميزات حجب IP المدمجة في QNAP وحماية تسجيل الدخول الفاشل.

قواعد الكشف:
11. مراقبة سجلات خادم الويب بحثاً عن أنماط اجتياز المسار في الطلبات الموجهة لـ Photo Station.
12. إنشاء تنبيهات SIEM لأنماط الوصول غير المعتادة إلى الملفات على أجهزة QNAP.
13. نشر توقيعات IDS للشبكة لمحاولات استغلال ثغرة اجتياز المسار في QNAP Photo Station.
14. مراجعة سجلات وصول QNAP بحثاً عن طلبات GET/POST غير طبيعية تحتوي على تسلسلات اجتياز مشفّرة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Asset Management — Unauthorized access to NAS assets ECC-2-2-1: Vulnerability Management — Critical unpatched vulnerability ECC-2-3-1: Patch Management — Timely application of security patches ECC-2-6-1: Network Security — Perimeter access controls for NAS devices ECC-3-3-1: Data and Information Security — Protection of stored data from unauthorized access
🔵 SAMA CSF
Cyber Security Operations — Vulnerability and Patch Management Asset Management — Identification and protection of NAS storage assets Access Control — Restricting unauthorized remote access to file systems Data Protection — Preventing unauthorized access to sensitive financial data stored on NAS
🟡 ISO 27001:2022
A.8.8 — Management of technical vulnerabilities A.8.20 — Networks security controls for NAS isolation A.8.3 — Information access restriction A.8.9 — Configuration management of QNAP devices A.5.30 — ICT readiness for business continuity
🟣 PCI DSS v4.0
Requirement 6.3.3 — All system components protected from known vulnerabilities via patching Requirement 1.3 — Network access controls restricting inbound/outbound traffic to NAS Requirement 10.2 — Audit log implementation for file access events on NAS devices
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
QNAP:Photo Station
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.11%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-06-22
Published 2022-06-08
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.1
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.