Analysis of NAS Device Vulnerabilities and Using Nmap
Dušan Kocić
, Goran Stamenović
, Nemanja Zdravković 
Belgrade Metropolitan University, Serbia
dusan.kocic.6382@metropolitan.ac.rs
goran.stamenovic@metropolitan.ac.rs
nemanja.zdravkovic@metropolitan.ac.rs
DOI: 10.46793/BISEC25.214K
ABSTRACT: Network-Attached Storage (NAS) devices are widely deployed in enterprise and consumer environments as centralized storage solutions for file sharing, backup, and IoT integration. However, improper configuration, outdated firmware, and lack of network segmentation can expose these devices to severe security risks. This paper presents a practical vulnerability assessment of a real-world Wi-Fi network, with a specific focus on NAS exposure, using the Nmap tool and its Nmap Scripting Engine. In this paper, we apply host discovery, TCP SYN scanning, service and version detection, and vulnerability probing through publicly documented CVEs. The analysis reveals multiple critical vulnerabilities which enable unauthenticated administrator password reset and allows full system compromise. Additional findings included directory traversal and credential exposure vulnerabilities on a router, an exposed UPnP service, and a legacy phpMyAdmin Local File Inclusion flaw.
The results demonstrate how a single misconfigured NAS device, combined with router-level vulnerabilities and lack of segmentation, can compromise the integrity of an entire network. The study underscores the importance of continuous vulnerability assessment, timely firmware updates, secure configuration, and proactive network hardening practices.
KEYWORDS: NAS · Nmap · NSE · Network security · Network auditing · NAS security.
REFERENCES:
- Amazon Web Services: What is NAS (Network-Attached Storage)? https://aws.amazon.com/what-is/nas/ (2025), accessed: 2025-11-01
- Khandale, S.P.: Iot based network attached storage. Int. J. Sci. Technol. Eng 12(11), 2247–2255 (2024)
- Duong, M.: What Protocol Should You Choose For Your NAS? https://www.thegalah.com/choosing-right-protocol-your-nas-afp-vs-smb-nfs-iscsi (2023), accessed: 2025-11-01
- Dimitrijević, N., Zdravković, N., Bogdanović, M., Mesterovic, A.: Advanced Security Mechanisms in the Spring Framework: JWT, OAuth, LDAP and Keycloak. In: Proceedings of the 14th International Conference on Business Information Security (BISEC 2023). pp. 64–70 (2024)
- Yasui, H., Inoue, T., Sasaki, T., Tanabe, R., Yoshioka, K., Matsumoto, T.: SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices. Journal of Information Processing 32, 23–34 (2024)
- Zhou, X., Wang, P., Zhou, L., Xun, P., Lu, K.: A survey of the security analysis of embedded devices. Sensors 23(22), 9221 (2023)
- Lyon, G.F.: Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure (2009)
- NIST: National Vulnerability Database: CVE-2012-2568. https://nvd.nist.gov/vuln/detail/CVE-2012-2568 (2012), accessed: 2025-11-01
- NIST: National Vulnerability Database: CVE-2005-2869. https://nvd.nist.gov/vuln/detail/CVE-2005-2869 (2005), accessed: 2025-11-01
- NIST: National Vulnerability Database: CVE-2009-3733. https://nvd.nist.gov/vuln/detail/cve-2009-3733 (2009), accessed: 2025-11-01
- Kost, E.: What is UPnP? https://www.upguard.com/blog/what-is-upnp (2025), accessed: 2025-11-01
- Fortinet: What is a CVE? Meaning & Definition How Does CVE Define Vulnerabilities? https://www.fortinet.com/resources/cyberglossary/cve (2025), accessed: 2025-11-01
- Fang, Z., Fu, H., Gu, T., Hu, P., Song, J., Jaeger, T., Mohapatra, P.: Iota: A framework for analyzing system-level security of iots. In: 2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI). pp. 143–155. IEEE (2022)
- Bakhshi, T., Ghita, B., Kuzminykh, I.: A review of iot firmware vulnerabilities and auditing techniques. Sensors 24(2), 708 (2024)
- CVEdetails: CVEdetails, Vulnerability Details : CVE-2012-2568. https://www.cvedetails.com/cve/CVE-2012-2568/ (2012), accessed: 2025-11-1
- NIST: National Vulnerability Database: CVE-2018-10822. https://nvd.nist.gov/vuln/detail/cve-2018-10822 (2018), accessed: 2025-11-01
- NIST: National Vulnerability Database: CVE-2018-10824. https://nvd.nist.gov/vuln/detail/cve-2018-10824 (2018), accessed: 2025-11-01
- Barricade Cyber Solutions: EPSS Lookup Tool. https://epsslookuptool.com/ (2025), accessed: 2025-11-01
IZVOR: Proceedings of the 16th International Conference on Business Information Security BISEC’2025