What are you looking for ?
Advertise with us
RAIDON

Buffalo Security Advisory: Vulnerabilities Related to AFP in TeraStation and LinkStation NAS

For older products that do not have firmware updates available, company urges all TeraStation and LinkStation users to disable AFP on devices by following appropriate procedures available.

Buffalo Americas Inc. issued a product security notice regarding multiple vulnerabilities related to AFP in TeraStation and LinkStation NAS products.

AFP is a proprietary network protocol for file services. Security vulnerabilities may allow threat actors to execute unauthorized code or improperly obtain data on affected storage products.

The company would like to remind our customers to update the firmware for certain affected products in order to patch the vulnerabilities.

For older products that do not have firmware updates available,the company urges all TeraStation and LinkStation users to disable AFP on their devices by following the appropriate procedures available on the Security Notices page.

AFP vulnerabilities advisory summary
We have confirmed multiple vulnerabilities related to AFP in our TeraStation and LinkStation NAS products. Data stored in affected products may be improperly obtained or arbitrary code from threat actors may be executed.

We are currently investigating our products, and will release information on the target products and countermeasures as appropriate. The vulnerabilities and affected products that have been identified so far are as follows:

Vulnerability ID

Vulnerability overview

CVE-2021-31439

A heap-based buffer overflow vulnerability

CVE-2022-23121

An improper handling vulnerability present under exceptional conditions

CVE-2022-0194

A stack-based buffer overflow vulnerability

CVE-2022-23122

A stack-based buffer overflow vulnerability

CVE-2022-23125

A stack-based buffer overflow vulnerability

CVE-2022-23123

An out-of-bounds read vulnerability

CVE-2022-23124

An out-of-bounds read vulnerability

Affected products

Product series

Corrective action(s)

TS6000

Update firmware to version 5.62 or later.

TS5010/3010/3020

Update firmware to version 5.34 or later.

TS1000

Please follow corrective action below.

TS3000

Please follow corrective action below.

TS5000

Please follow corrective action below.

TS5200DS

Please follow corrective action below.

TS-2RZ

Please follow corrective action below.

LS200

Please follow corrective action below.

LS400

Please follow corrective action below.

LS500

Please follow corrective action below.

TS-X

Please follow corrective action below.

TS-V

Please follow corrective action below.

Corrective actions
For products for which patch firmware has not yet been released, please refer to the appropriate procedures below to manually disable the AFP function. When new firmware is released for the affected products, we will update this page accordingly.

Corrective Procedures
Select the product series you are using to follow its corrective procedure.

TS-2RZ, TS5000/3000/1000 Series

Disable AFP

(1)     From Settings, click [File Sharing].

(2)     Click the switch icon next to [AFP] to turn it off .

LS200/400 Series

Disable AFP

(1)     From Settings, click [File Sharing].

(2)     Click the switch icon next to [AFP] to turn it off.

LS500 Series

Disable AFP

(1)     From Settings, click [Preferences].

(2)     Click [AFP].

(3)     Uncheck [Enable AFP], and then click [Apply].

TS-X/V Series

Disable AFP

(1)     From Settings, navigate to [Network] – [Network] – [Network Service] – [AFP].

(2)     Click [Do not use], and then click [Save].

Page revision history

Date

Description

8/31/22

Initial public release

Articles_bottom
ExaGrid
AIC
ATTOtarget="_blank"
OPEN-E