Synology Fixes Critical Vulnerability in VPN Routers

A Taiwanese manufacturer has fixed a vulnerability that scored 10 out of 10 on the CVSS vulnerability rating scale. The issue affected routers configured to act as VPN servers using Synology VPN Plus Server.

The vulnerability has been identified as CVE-2022-43931 and is described as an out-of-bounds entry bug related to the remote desktop functionality of Synology VPN Plus Server.

The manufacturer said that the successful exploitation of this bug, discovered by the company’s own security team, “allows remote attackers to execute arbitrary commands through arbitrary vectors.” However, it is known that exploitation of the vulnerability does not require privileges on the target routers or any user interaction.

As a result, VPN Plus Server for Synology Router Manager (SRM) 1.2 and VPN Plus Server for SRM 1.3 users are advised to upgrade to version 1.4.3-0534 and 1.4.4-0635 as soon as possible.

It is also worth noting that Synology engineers have also warned of several bugs in SRM that allow remote attackers to execute arbitrary commands, carry out denial of service attacks, and read arbitrary files.

The exact details of these vulnerabilities have not been disclosed, but users are strongly advised to upgrade to versions 1.2.5-8227-6 and 1.3.1-9346-3 to mitigate potential risks.

Interestingly, a number of vulnerabilities in Synology devices were demonstrated at the Pwn2Own hacker competition, which took place in mid-December. Although Synology did not list the CVE IDs for these issues, it appears that these are the bugs discovered and exploited by the researchers at Pwn2Own.

Catch up on more articles here

Follow us on Twitter here

Read more

Explore the site

More from the blog

Latest News