Synology-SA-23:16 SRM (PWN2OWN 2023)
Publish Time: 2023-11-21 10:19:00 UTC+8
Last Updated: 2024-06-28 14:32:06 UTC+8
- Severity
- Important
- Status
- Resolved
Abstract
The vulnerabilities allow man-in-the-middle attackers to execute arbitrary code or access intranet resources via a susceptible version of Synology Router Manager (SRM).
A vulnerability reported by PWN2OWN 2023 has been addressed.
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
SRM 1.3 | Important | Upgrade to 1.3.1-9346-8 or above. |
SRM 1.2 | Important | Upgrade to 1.2.5-8227-11 or above. |
Mitigation
None
Detail
CVE-2024-39348
- Severity: Important
- CVSS3 Base Score: 7.5
- CVSS3 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
- Download of code without integrity check vulnerability in AirPrint functionality in Synology Router Manager (SRM) before 1.2.5-8227-11 and 1.3.1-9346-8 allows man-in-the-middle attackers to execute arbitrary code via unspecified vectors.
CVE-2024-39347
- Severity: Moderate
- CVSS3 Base Score: 5.9
- CVSS3 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Incorrect default permissions vulnerability in firewall functionality in Synology Router Manager (SRM) before 1.2.5-8227-11 and 1.3.1-9346-8 allows man-in-the-middle attackers to access highly sensitive intranet resources via unspecified vectors.
Acknowledgement
Tomer Goldschmidt and Sharon Brizinov of Claroty Research - Team82
Tri and Bien Pham (@bienpnn) from Team Orca of Sea Security working with Trend Micro Zero Day Initiative
Reference
Revision
Revision | Date | Description |
---|---|---|
1 | 2023-11-21 | Initial public release. |
2 | 2024-06-28 | Disclosed vulnerability details. |