Thursday, December 26, 2024

Synology: Critical vulnerabilities in NAS allow attackers to execute malicious code

Date:

Synology warns of a total of four security holes in certain series of NAS devices. Three of these are classified as critical and allow network attackers to execute arbitrary code on devices. The updated firmware that closes the vulnerabilities is ready.

All three critical vulnerabilities can be found in the out-of-band (OOB) management of NAS devices. When decrypting packets, the bounds of a buffer could be overwritten (CVE-2022-27624, CVSS 10risk “critical“). Such a buffer overflow could also occur when processing messages (CVE-2022-27625, CVSS 10, critical).

When running with shared resources, insufficient synchronization could lead to a so-called race condition, which also allows attackers to execute arbitrary commands (CVE-2022-27626, CVSS 10, critical). The error in the processing of the OOB session, which allows access outside its memory limits and therefore the output of confidential information, seems less serious (CVE-2022-3576, CVSS 5.3, medium).

are affected according to Synology announcement DS3622xs+, FS3410 and HD6500 series devices. Diskstation Manager software version 7.1.1-42962-2 is available for these devices, which plugs the security holes. Administrators should download and install updates quickly.

Recommended Editorial Content

With your consent, an external survey (Opinary GmbH) will be uploaded here.

Always load surveys

To apply the updated firmware, administrators must remove the .pat file that contains the update from the Synology Download Page to suit your device and installed version and download it. The “DSM Manual Update” page should now be opened in the device UI and the .pat file selected there by clicking “Browse”. The update starts when you select “Apply”.

More recently, Synology had to seal security holes that dated back to the netatalk protocol.


(DMK)

to the home page

Ebenezer Robbins
Ebenezer Robbins
Introvert. Beer guru. Communicator. Travel fanatic. Web advocate. Certified alcohol geek. Tv buff. Subtly charming internet aficionado.

Share post:

Popular

More like this
Related

How to Use Video Marketing to Promote B2C Products?

Video marketing has emerged as a powerful tool for...

Adapting to Change: The Future for Leopard Tortoise Environments

Leopard tortoises, known for their striking spotted shells and...

Debunking Common Misconceptions in Nail Care

Acrylic nails, a popular choice for those seeking durable...

Top Reasons to Buy Instagram Likes from InsFollowPro.com

Buying Instagram followers is a strategy some individuals and...