ASUSTOR Detects Severe Vulnerability and Launches Emergency Update

👤by Michael Pabia Comments 📅09.02.2024 23:16:14

ASUSTOR detects a severe security vulnerability in the Surveillance Center and launches an emergency update to counter the threat of a possible malware attack. Users of the Surveillance Center application are strongly advised to update to the latest version immediately. The ASUS Surveillance Center is an app that turns an ASUSTOR NAS into a 24/7 non-stop high-resolution security surveillance system. The app is compatible with web browsers or installed on Windows PCs and mobile devices. ASUSTOR did not specify if the vulnerability applies to apps installed on Windows computers only. Read the released statement from ASUSTOR below.

Press Release
An emergency update is being pushed for Surveillance Center in response to a severe vulnerability detected in the software that could potentially allow an attacker to gain control elevated privileges to execute code on ADM to install malware. This update fixes this underlying vulnerability. ASUSTOR strongly urges all users of Surveillance Center for ADM to install the latest version as soon as possible to protect themselves and to minimize the risk of malware infection. ASUSTOR also recommends taking additional security measures to guard against the potential harms of malware in accordance with previously announced protective measures.

ASUSTOR strongly recommends taking the following actions to ensure your data is secure:
Change your password.
Use a strong password.
Change default HTTP and HTTPS ports. Default ports are 8000 and 8001 respectively.
Turn off Terminal/SSH and SFTP services and other services you do not use.
Make regular backups and ensure backups are up to date.
Turn on and update snapshots if available.
Enable the AbuseIPDB risk detection greylist.

Related Stories

Recent Stories

« Patriot Memory Introduces Viper PV553 PCIe Gen5 SSD · ASUSTOR Detects Severe Vulnerability and Launches Emergency Update · Super Flower Launches Zillion M705 Chassis »