Synology-SA-21:03 DSM
Publish Time: 2021-02-23 09:15:43 UTC+8
Last Updated: 2021-06-11 09:45:46 UTC+8
- Severity
- Important
- Status
- Accepted
Abstract
Multiple vulnerabilities allow remote attackers to obtain sensitive information or local users to execute arbitrary code via a susceptible version of DiskStation Manager (DSM).
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
DSM 6.2 | Important | Upgrade to 6.2.4-25553 or above. |
DSM UC 3.0 | Important | Pending |
SkyNAS | Important | Pending |
VS960HD | Not affected | N/A |
Mitigation
None
Detail
CVE-2021-26563
- Severity: Important
- CVSS3 Base Score: 8.2
- CVSS3 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
- Improper access control vulnerability in synoagentregisterd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows local users to obtain sensitive information via a crafted kernel module.
CVE-2021-33182
- Severity: Moderate
- CVSS3 Base Score: 5.0
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
- Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in PDF Viewer component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows remote authenticated users to read limited files via unspecified vectors.
CVE-2021-29088
- Severity: Important
- CVSS3 Base Score: 7.8
- CVSS3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Improper limitation of a pathname to a restricted directory ('Path Traversal') in cgi component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows local users to execute arbitrary code via unspecified vectors.
Acknowledgement
Claudio Bozzato of Cisco Talos
Bing-Jhong Jheng
Revision
Revision | Date | Description |
---|---|---|
1 | 2021-02-23 | Initial public release. |
2 | 2021-06-10 | Disclosed vulnerability details. |
3 | 2021-05-28 | Updated severity for VS960HD in Affected Products. |