INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 5h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 5h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 5h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h
Vulnerabilities

CVE-2022-27593

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
QNAP Photo Station Externally Controlled Reference Vulnerability — Certain QNAP NAS running Photo Station with internet exposure contain an externally controlled reference to a resource vulnerability
Published: Sep 8, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

QNAP Photo Station Externally Controlled Reference Vulnerability — Certain QNAP NAS running Photo Station with internet exposure contain an externally controlled reference to a resource vulnerability which can allow an attacker to modify system files. This vulnerability was observed being utilized in a Deadbolt ransomware campaign.

🤖 AI Executive Summary

CVE-2022-27593 is a critical externally controlled reference vulnerability in QNAP Photo Station that allows remote attackers to modify system files, leading to potential ransomware deployment. With a CVSS score of 9.0 and active exploit availability, this vulnerability poses an immediate threat to organizations using internet-exposed QNAP NAS devices. The vulnerability was actively exploited in the Deadbolt ransomware campaign, making immediate patching essential.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 21:44
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using QNAP NAS devices for media storage and backup—particularly in government agencies, healthcare institutions, and media companies—face critical risk. Government entities under NCA oversight, banking sector backup systems, and ARAMCO subsidiary operations utilizing QNAP infrastructure are at highest risk. The ransomware capability directly threatens business continuity and data confidentiality across critical sectors. Organizations in the Kingdom with internet-exposed Photo Station instances are prime targets for Deadbolt and similar ransomware variants.
🏢 Affected Saudi Sectors
Government Banking and Financial Services Healthcare Energy and Utilities Telecommunications Media and Broadcasting Education
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all QNAP NAS devices running Photo Station in your environment using network scanning tools
2. Immediately isolate internet-exposed QNAP devices from public networks or disable Photo Station service
3. Check QNAP security advisory for affected firmware versions and apply patches immediately
4. Review access logs for suspicious activity or file modifications dating back 30+ days

PATCHING GUIDANCE:
1. Download latest firmware from QNAP support portal matching your NAS model
2. Perform full system backup before patching
3. Apply patches during maintenance window with verified backups offline
4. Verify patch installation and Photo Station service functionality post-update

COMPENSATING CONTROLS (if patching delayed):
1. Implement network segmentation—restrict Photo Station access to internal networks only
2. Deploy WAF rules blocking suspicious file path traversal patterns
3. Enable QNAP system audit logging and monitor for file modification events
4. Implement IP whitelisting for Photo Station access
5. Disable Photo Station if not actively required

DETECTION RULES:
1. Monitor for HTTP requests containing path traversal sequences (../, ..\) to Photo Station endpoints
2. Alert on unexpected system file modifications in QNAP system directories
3. Track failed authentication attempts followed by successful access
4. Monitor for unusual outbound connections from QNAP devices to external IPs
5. Alert on creation of executable files in web-accessible directories
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة QNAP NAS التي تقوم بتشغيل Photo Station في بيئتك باستخدام أدوات المسح
2. عزل أجهزة QNAP المكشوفة على الإنترنت فوراً عن الشبكات العامة أو تعطيل خدمة Photo Station
3. التحقق من استشارة أمان QNAP للإصدارات المتأثرة وتطبيق التصحيحات فوراً
4. مراجعة سجلات الوصول للنشاط المريب أو تعديلات الملفات من آخر 30+ يوم

إرشادات التصحيح:
1. تحميل أحدث البرنامج الثابت من بوابة دعم QNAP المطابق لطراز NAS الخاص بك
2. إجراء نسخة احتياطية كاملة للنظام قبل التصحيح
3. تطبيق التصحيحات خلال نافذة الصيانة مع نسخ احتياطية محققة غير متصلة
4. التحقق من تثبيت التصحيح وعمل خدمة Photo Station بعد التحديث

الضوابط البديلة (إذا تأخر التصحيح):
1. تنفيذ تقسيم الشبكة—تقييد وصول Photo Station للشبكات الداخلية فقط
2. نشر قواعد WAF لحجب أنماط اجتياز المسارات المريبة
3. تفعيل تسجيل تدقيق نظام QNAP ومراقبة أحداث تعديل الملفات
4. تنفيذ القائمة البيضاء للعناوين IP لوصول Photo Station
5. تعطيل Photo Station إذا لم يكن مطلوباً بنشاط

قواعد الكشف:
1. مراقبة طلبات HTTP التي تحتوي على تسلسلات اجتياز المسارات لنقاط نهاية Photo Station
2. تنبيه على تعديلات ملفات النظام غير المتوقعة في دلائل نظام QNAP
3. تتبع محاولات المصادقة الفاشلة متبوعة بالوصول الناجح
4. مراقبة الاتصالات الخارجية غير العادية من أجهزة QNAP إلى عناوين IP خارجية
5. تنبيه على إنشاء ملفات قابلة للتنفيذ في الدلائل المتاحة على الويب
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.12.6.1 - Management of technical vulnerabilities ECC 2024 A.14.2.1 - Secure development policy ECC 2024 A.12.2.1 - Monitoring and logging ECC 2024 A.13.1.3 - Segregation of networks
🔵 SAMA CSF
ID.RA-1 - Asset management and vulnerability identification PR.IP-12 - System and information integrity DE.CM-1 - Detection and analysis RS.RP-1 - Response planning
🟡 ISO 27001:2022
A.12.6.1 - Management of technical vulnerabilities A.14.2.1 - Secure development policy A.12.2.1 - Monitoring A.13.1.3 - Segregation of networks
🟣 PCI DSS v4.0
Requirement 6.2 - Security patches and updates Requirement 11.2 - Vulnerability scanning
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
QNAP:Photo Station
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS92.96%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-09-29
Published 2022-09-08
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.