We use cookies to help us improve our webpage. Please read our Cookie Policy.

Synology-SA-18:24 DSM

Publish Time: 2018-05-23 14:07:44 UTC+8

Last Updated: 2018-06-08 15:36:43 UTC+8

Severity
Important
Status
Resolved

Abstract

Multiple vulnerabilities allow remote authenticated users to execute arbitrary commands or to set new password without verification via a susceptible version of Synology DiskStation Manager (DSM).

Affected Products

Product Severity Fixed Release Availability
DSM 6.1 Important Upgrade to DSM 6.2-23739 or above.
DSM 6.0 Important Upgrade to DSM 6.2-23739 or above.
DSM 5.2 Important Upgrade to DSM 6.2-23739 or above.

Mitigation

None

Detail

  • CVE-2017-12075

    • Severity: Important
    • CVSS3 Base Score: 7.2
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
    • Command injection vulnerability in EZ-Internet in Synology DiskStation Manager (DSM) before 6.2-23739 allows remote authenticated users to execute arbitrary command via the username parameter.
  • CVE-2018-8916

    • Severity: Moderate
    • CVSS3 Base Score: 6.3
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
    • Unverified password change vulnerability in Change Password in Synology DiskStation Manager (DSM) before 6.2-23739 allows remote authenticated users to reset password without verification.

Revision

Revision Date Description
1 2018-05-23 Initial public release.
2 2018-06-08 Disclosed vulnerability details.