Synology-SA-24:01 DSM
Publish Time: 2024-01-09 12:01:13 UTC+8
Last Updated: 2024-12-03 15:08:17 UTC+8
- Severity
- Important
- Status
- Resolved
Abstract
A vulnerability allows local users to execute arbitrary code via a susceptible version of Synology DiskStation Manager (DSM).
Successful exploitation of this vulnerability requires a user to download a malicious patch from a non-official Synology download site and install it manually before the vulnerability can be exploited.
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
DSM 7.2 | Important | Upgrade to 7.2-64561 or above. |
DSM 7.1 | Important | Upgrade to 7.1.1-42962-7 or above. |
DSM 7.0 | Important | Upgrade to 7.0.1-42218-7 or above. |
DSM 6.2 | Important | Upgrade to 6.2.4-25556-8 or above. |
DSMUC 3.1 | Important | Upgrade to 3.1.2-23068 or above. |
Mitigation
None
Detail
Reserved
Acknowledgement
Qian Chen (@cq674350529) from Codesafe Team of Legendsec at Qi'anxin Group
Revision
Revision | Date | Description |
---|---|---|
1 | 2024-01-09 | Initial public release. |
2 | 2024-01-11 | Updated Abstract for more details. |
3 | 2024-11-26 | Update for DSM 7.1 is now available in Affected Products. |
4 | 2024-11-28 | Update for DSM 7.0 is now available in Affected Products. |
5 | 2024-12-03 | Update for DSM 6.2 is now available in Affected Products. |