Synology-SA-25:10 RADIUS Server
Publish Time: UTC+8
Last Updated: UTC+8
- Severity
- Moderate
- Status
- Resolved
Abstract
Synology has released a security update for the RADIUS Server package in SRM to address a vulnerability:
- CVE-2024-13987 allows remote authenticated users with administrator privileges to read or write limited files.
Please refer to the 'Affected Products' table for the corresponding updates.
Affected Products
| Product | Severity | Fixed Release Availability |
|---|---|---|
| RADIUS Server for DSM 7.2.2 | Moderate | Upgrade to 3.0.27-0516 or above. |
| RADIUS Server for DSM 7.1 | Moderate | Upgrade to 3.0.27-0453 or above. |
| RADIUS Server for SRM 1.3 | Moderate | Upgrade to 3.0.27-0139 or above. |
Mitigation
None
Detail
- CVE-2024-13987
- Severity: Moderate
- CVSS3 Base Score: 5.9
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- Improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability in Synology RADIUS Server allows remote authenticated users with administrator privileges to read or write limited files in SRM and conduct limited denial-of-service via unspecified vectors.
Acknowledgement
Only Hack in Cave (tr4ce(Jinho Ju), neko_hat(Dohwan Kim), tw0n3(Han Lee), Hc0wl(GangMin Kim))
Reference
Revision
| Revision | Date | Description |
|---|---|---|
| 1 | 2025-08-29 | Initial public release. |
| 2 | 2025-08-29 | Disclosed vulnerability details. |
| 3 | 2025-09-01 | Disclosed vulnerability details. |