Synology fixed critical flaw impacting millions of DiskStation and BeePhotos NAS devices

Article thumbnail image

This post was originally published on Security Affairs. It can be found here.

Synology addressed a critical vulnerability in DiskStation and BeePhotos NAS devices that could lead to remote code execution.

Taiwanese vendor Synology has addressed a critical security vulnerability, tracked as CVE-2024-10443, that impacts DiskStation and BeePhotos. An attacker can exploit the flaw without any user interaction and successful exploitation of this flaw could lead to remote code execution.

Security researcher Rick de Jager demonstrated the vulnerability, called RISK:STATION by cybersecurity firm Midnight Blue, at the Pwn2Own Ireland 2024 hacking contest.

Midnight Blue took 3rd at Pwn2Own Ireland 2024, the team demonstrated five zero-day flaws in routers, printers, security cameras, and NAS devices. Among these was RISK:STATION, a zero-click flaw that enables root-level access on Synology NAS devices like DiskStation, impacting millions. Synology quickly addressed the vulnerability within 48 hours after notification, but, given the risk, urged users to apply updates immediately.

“One of these vulnerabilities is RISK:STATION, an unauthenticated zero-click vulnerability allowing attackers to obtain root-level code execution on the popular Synology DiskStation and BeeStation NAS devices, affecting millions of devices.” reads the report published by Midnightblue. “The vulnerability was initially discovered, within just a few hours, as a replacement for another Pwn2Own submission. The issue was disclosed to Synology immediately after demonstration, and within 48 hours a patch was made available which resolves the vulnerability. Official guidance from Synology can be found on their advisories page. However, since the vulnerability has a high potential for criminal abuse, and millions of devices are affected, a media reach-out was made to inform system owners of the issue and to stress the point that immediate mitigative actions are required.”

Below is the list of affected versions:

  • BeePhotos for BeeStation OS 1.0 (Upgrade to 1.0.2-10026 or above)
  • BeePhotos for BeeStation OS 1.1 (Upgrade to 1.1.0-10053 or above)
  • Synology Photos 1.6 for DSM 7.2 (Upgrade to 1.6.2-0720 or above)
  • Synology Photos 1.7 for DSM 7.2 (Upgrade to 1.7.0-0795 or above)

Taiwanese manufacturer QNAP also patched three zero-day vulnerabilities that were exploited by security researchers during the recent Pwn2Own Ireland 2024.

Technical details of the RISK:STATION vulnerability remain under embargo to prevent abuse. Midnight Blue assumes all Synology firmware versions before the patch are vulnerable, so users should apply the patch immediately.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Synology)

This post was originally published on this site

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
Test post2

Test Post2

By Demo User12, 11 months ago

Finding internships

Hello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what...

By AP Malla, 11 months ago

Beginner network forensic investigation

How should I approach network forensic? Would you recommend learning tools like WireShark?

By AP Malla, 11 months ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla, 11 months ago

LATEST POSTS