INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 1h Global malware Networking / Infrastructure CRITICAL 2h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 3h Global supply_chain Software Development and DevOps CRITICAL 4h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 7h Global malware Technology and Software Development CRITICAL 7h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 8h Global vulnerability Mobile Devices / Consumer Electronics HIGH 1h Global malware Networking / Infrastructure CRITICAL 2h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 3h Global supply_chain Software Development and DevOps CRITICAL 4h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 7h Global malware Technology and Software Development CRITICAL 7h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 8h Global vulnerability Mobile Devices / Consumer Electronics HIGH 1h Global malware Networking / Infrastructure CRITICAL 2h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 3h Global supply_chain Software Development and DevOps CRITICAL 4h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 7h Global malware Technology and Software Development CRITICAL 7h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 8h
Vulnerabilities

CVE-2022-24990

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
TerraMaster OS Remote Command Execution Vulnerability — TerraMaster OS contains a remote command execution vulnerability that allows an unauthenticated user to execute commands on the target endpoint.
Published: Feb 10, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

TerraMaster OS Remote Command Execution Vulnerability — TerraMaster OS contains a remote command execution vulnerability that allows an unauthenticated user to execute commands on the target endpoint.

🤖 AI Executive Summary

TerraMaster OS contains a critical unauthenticated remote command execution vulnerability (CVSS 9.0) allowing attackers to execute arbitrary commands without authentication. This vulnerability poses an immediate threat to organizations using TerraMaster NAS devices for data storage and backup. With public exploits available, exploitation risk is extremely high and requires immediate patching.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 17:38
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations in banking, government, healthcare, and energy sectors using TerraMaster NAS devices for critical data storage and backup are at severe risk. SAMA-regulated financial institutions, NCA government agencies, ARAMCO energy infrastructure, and healthcare providers (MOH) storing sensitive data on TerraMaster devices face potential data breach, ransomware deployment, and operational disruption. Telecom operators (STC, Mobily) using TerraMaster for network infrastructure backups are particularly vulnerable.
🏢 Affected Saudi Sectors
Banking and Financial Services (SAMA-regulated) Government and Public Administration (NCA oversight) Healthcare (MOH facilities) Energy and Utilities (ARAMCO, power generation) Telecommunications (STC, Mobily, Zain) Education and Research Manufacturing and Industrial Retail and E-commerce
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all TerraMaster NAS devices in your environment and document their network locations and data criticality
2. Isolate affected TerraMaster devices from production networks immediately or restrict network access to trusted sources only
3. Implement network segmentation to limit lateral movement if compromise occurs
4. Enable comprehensive logging and monitoring on TerraMaster devices

PATCHING:
5. Apply the latest TerraMaster OS security patches immediately from official TerraMaster support channels
6. Verify patch installation and reboot devices to ensure updates are active
7. Change all default and weak credentials on TerraMaster devices

COMPENSATING CONTROLS (if patching delayed):
8. Implement firewall rules to restrict access to TerraMaster management interfaces (typically ports 8080, 8443) to authorized IP ranges only
9. Disable remote access features if not required for operations
10. Deploy Web Application Firewall (WAF) rules to detect exploitation attempts

DETECTION:
11. Monitor for suspicious HTTP/HTTPS requests to TerraMaster devices with command injection patterns
12. Alert on unexpected process execution from TerraMaster services
13. Monitor for unusual outbound connections from TerraMaster devices
14. Review TerraMaster access logs for unauthenticated access attempts
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. حدد جميع أجهزة TerraMaster NAS في بيئتك وقثق مواقعها على الشبكة وأهمية البيانات
2. عزل أجهزة TerraMaster المتأثرة عن شبكات الإنتاج فوراً أو تقييد الوصول إلى الشبكة للمصادر الموثوقة فقط
3. تنفيذ تقسيم الشبكة لتحديد الحركة الجانبية في حالة الاختراق
4. تفعيل السجلات الشاملة والمراقبة على أجهزة TerraMaster

التصحيح:
5. تطبيق أحدث تصحيحات أمان نظام TerraMaster OS فوراً من قنوات دعم TerraMaster الرسمية
6. التحقق من تثبيت التصحيح وإعادة تشغيل الأجهزة للتأكد من تفعيل التحديثات
7. تغيير جميع بيانات الاعتماد الافتراضية والضعيفة على أجهزة TerraMaster

الضوابط البديلة (إذا تأخر التصحيح):
8. تنفيذ قواعد جدار الحماية لتقييد الوصول إلى واجهات إدارة TerraMaster (عادة المنافذ 8080، 8443) إلى نطاقات IP المصرح بها فقط
9. تعطيل ميزات الوصول البعيد إذا لم تكن مطلوبة للعمليات
10. نشر قواعد جدار تطبيقات الويب (WAF) للكشف عن محاولات الاستغلال

الكشف:
11. مراقبة طلبات HTTP/HTTPS المريبة إلى أجهزة TerraMaster بأنماط حقن الأوامر
12. التنبيه على تنفيذ العمليات غير المتوقعة من خدمات TerraMaster
13. مراقبة الاتصالات الخارجية غير المعتادة من أجهزة TerraMaster
14. مراجعة سجلات الوصول إلى TerraMaster لمحاولات الوصول غير المصرح بها
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Information Security Policies and Procedures ECC 2024 A.5.2.1 - Access Control and Authentication ECC 2024 A.5.3.1 - Cryptography and Data Protection ECC 2024 A.5.4.1 - Vulnerability Management and Patch Management ECC 2024 A.5.5.1 - Incident Detection and Response
🔵 SAMA CSF
SAMA CSF ID.AM-2 - Asset Management and Inventory SAMA CSF PR.AC-1 - Access Control and Authentication SAMA CSF PR.PT-2 - Protective Technology and Patch Management SAMA CSF DE.CM-1 - Detection and Monitoring SAMA CSF RS.RP-1 - Response Planning and Incident Response
🟡 ISO 27001:2022
ISO 27001:2022 A.5.15 - Access Control ISO 27001:2022 A.5.16 - Cryptography ISO 27001:2022 A.5.17 - Physical and Environmental Security ISO 27001:2022 A.8.1 - Organizational Controls ISO 27001:2022 A.8.2 - Mobile Device and Teleworking ISO 27001:2022 A.8.6 - Supplier Relationships ISO 27001:2022 A.8.7 - Information Security Incident Management
🟣 PCI DSS v4.0
PCI DSS 2.1 - Change default passwords PCI DSS 2.2.4 - Configure system security parameters PCI DSS 6.2 - Ensure security patches are installed PCI DSS 11.2 - Run automated vulnerability scans PCI DSS 12.2.1 - Implement change control procedures
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
TerraMaster:TerraMaster OS
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.40%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-03-03
Published 2023-02-10
Source Feed cisa_kev
Views 4
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.