Synology-SA-26:05 Synology SSL VPN Client
Publish Time: UTC+8
Last Updated: UTC+8
- Severity
- Important
- Status
- Resolved
Abstract
Synology has released a security update for the Synology SSL VPN Client utility to address vulnerabilities:
- CVE-2021-47960 allows remote attackers to access sensitive files from the SSL VPN Client installation directory via a local HTTP service when a user interacts with a crafted web page.
- CVE-2021-47961 allows remote attackers to obtain or manipulate the PIN code in SSL VPN Client, potentially leading to unauthorized VPN configuration and traffic interception when a user interacts with a crafted web page.
Please refer to the Affected Products table for the corresponding updates.
Affected Products
| Product | Severity | Fixed Release Availability |
|---|---|---|
| Synology SSL VPN Client | Important | Upgrade to 1.4.5-0684 or above. |
Mitigation
None
Detail
CVE-2021-47960
- Severity: Important
- CVSS3 Base Score: 6.5
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
- CWE-552: Files or Directories Accessible to External Parties
- A files or directories accessible to external parties vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows remote attackers to access files within the installation directory via a local HTTP server bound to the loopback interface. By leveraging user interaction with a crafted web page, attackers may retrieve sensitive files such as configuration files, certificates, and logs, leading to information disclosure.
CVE-2021-47961
- Severity: Important
- CVSS3 Base Score: 8.1
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
- CWE-256: Plaintext Storage of a Password
- A plaintext storage of a password vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows remote attackers to access or influence the user's PIN code due to insecure storage. This may lead to unauthorized VPN configuration and potential interception of subsequent VPN traffic when combined with user interaction.
Acknowledgement
Laurent Sibilla (https://www.linkedin.com/in/lsibilla/)
Reference
Revision
| Revision | Date | Description |
|---|---|---|
| 1 | 2026-04-10 | Initial public release. |
| 2 | 2026-04-10 | Disclosed vulnerability details. |