Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

IoT Security

Critical Vulnerabilities Patched in Synology Routers

Taiwan-based networking and storage solutions provider Synology has informed customers about the availability of patches for several critical vulnerabilities, including flaws likely exploited recently at the Pwn2Own hacking contest.

Taiwan-based networking and storage solutions provider Synology has informed customers about the availability of patches for several critical vulnerabilities, including flaws likely exploited recently at the Pwn2Own hacking contest.

The company published two new critical advisories in late December. One of them describes an internally discovered vulnerability affecting Synology VPN Plus Server, which turns routers into an advanced VPN server.

The security hole, tracked as CVE-2022-43931, is an out-of-bounds write issue in the remote desktop functionality of VPN Plus Server. It can allow a remote attacker to execute arbitrary commands.

The second advisory describes multiple vulnerabilities impacting the Synology Router Manager (SRM), the operating system that powers the firm’s routers. The flaws can be exploited for arbitrary command execution, denial-of-service (DoS) attacks, and reading arbitrary files.

The SRM advisory credits several people and companies for reporting the vulnerabilities, including Gaurav Baruah and Computest. They disclosed the issues through Trend Micro’s Zero Day Initiative (ZDI).

This suggests that the vulnerabilities were demonstrated at the Pwn2Own Toronto 2022 hacking contest, which took place December 6-9. Participants earned nearly $1 million for exploits targeting smartphones, printers, routers, NAS devices, and smart speakers.

Baruah earned $20,000 for a command injection exploit against a Synology RT6600ax router’s WAN interface, while Computest earned $5,000 for a root shell attack targeting the device’s LAN interface.

At Pwn2Own, participants earned a total of more than $80,000 for hacking Synology routers and NAS devices, in addition to tens of thousands of dollars for chained exploits that targeted one Synology device and a second target.

Related: Synology, QNAP, WD Warn Users About Vulnerabilities Exploited at Hacking Contest

Related: ‘Raspberry Robin’ Windows Worm Abuses QNAP Devices

Related: QNAP Urges Users to Secure NAS Devices as Attacks Surge

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.