{"id":8184,"date":"2019-01-04T11:38:52","date_gmt":"2019-01-04T10:38:52","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=8184"},"modified":"2019-01-04T11:38:52","modified_gmt":"2019-01-04T10:38:52","slug":"multiple-vulnerabilities-in-synology-nas-systems","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/01\/04\/multiple-vulnerabilities-in-synology-nas-systems\/","title":{"rendered":"Multiple Vulnerabilities in Synology NAS systems"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2019\/01\/04\/bug-in-synology-software-gefhrdet-nas-speicher\/\" target=\"_blank\">German<\/a>]There is a critical vulnerability in the Netatalk (Apple AFP) system software used by Synology NAS devices. Attackers could remotely execute malicious code on the device. A security update is available for affected devices. And Synology has issued two warnings about additional vulnerabilities in Synology software.<\/p>\n<p><!--more--><\/p>\n<h2>The Netatalk Vulnerability<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg04.met.vgwort.de\/na\/54df4757444949118fd6e46cbbb808a7\" width=\"1\" height=\"1\">Synology released this security warning (<a href=\"https:\/\/www.synology.com\/en-global\/security\/advisory\/Synology_SA_18_62\" target=\"_blank\">Synology_SA_18_62<\/a>) about a vulnerability in Netatalk software. The vulnerability allows remote attackers to execute arbitrary code through a vulnerable version of Synology Diskstation Manager (DSM) and Synology Router Manager (SRM). The following Synology products are affected.<\/p>\n<table>\n<thead>\n<tr>\n<th>Product<\/th>\n<th>Severity<\/th>\n<th>Fixed Release Availability<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>DSM 6.2<\/td>\n<td>Critical<\/td>\n<td>Upgrade to 6.2.1-23824-4 or above.<\/td>\n<\/tr>\n<tr>\n<td>DSM 6.1<\/td>\n<td>Critical<\/td>\n<td>Upgrade to 6.1.7-15284-3 or above.<\/td>\n<\/tr>\n<tr>\n<td>DSM 5.2<\/td>\n<td>Critical<\/td>\n<td>Upgrade to 5.2-5967-9 or above.<\/td>\n<\/tr>\n<tr>\n<td>SkyNAS<\/td>\n<td>Critical<\/td>\n<td>Ongoing<\/td>\n<\/tr>\n<tr>\n<td>VS960HD<\/td>\n<td>Critical<\/td>\n<td>Upgrade to 2.3.3-1646 or above.<\/td>\n<\/tr>\n<tr>\n<td>SRM 1.2<\/td>\n<td>Important<\/td>\n<td>Upgrade to 1.2-7742-5 or above.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<blockquote>\n<blockquote>\n<p>Notes: This vulnerability only takes effect, if the Apple AFP (Netatalk) protocol is used on devices. In addition, remote exploitation is only possible if the device and its login interface are accessible via the Internet.  <\/p>\n<p>The <a href=\"https:\/\/de.wikipedia.org\/wiki\/Netatalk\" target=\"_blank\">Netatalk<\/a> software is a free software suite that provides components of the AppleTalk protocol family under POSIX-compatible operating systems. The above article refers only to Synology's security alerts. Anyone using Netatalk on other devices (QNAP, FreeNAS, Linux) should also take care of the issue there and clarify whether an update is necessary\/available. <\/p>\n<\/blockquote>\n<\/blockquote>\n<h2>Vulnerability in Synology Diskstation Manager (DSM)<\/h2>\n<p>There is also another vulnerability for which the vendor has issued the <a href=\"https:\/\/www.synology.com\/en-global\/security\/advisory\/Synology_SA_18_64\" target=\"_blank\">Synology-SA-18:64 DSM<\/a> security alert. This affects the following products.&nbsp; <\/p>\n<table>\n<thead>\n<tr>\n<th>Product<\/th>\n<th>Severity<\/th>\n<th>Fixed Release Availability<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>DSM 6.2<\/td>\n<td>Critical<\/td>\n<td>Upgrade to 6.2.1-23824-4 or above.<\/td>\n<\/tr>\n<tr>\n<td>DSM 6.1<\/td>\n<td>Critical<\/td>\n<td>Upgrade to 6.1.7-15284-3 or above.<\/td>\n<\/tr>\n<tr>\n<td>DSM 5.2<\/td>\n<td>Critical<\/td>\n<td>Upgrade to 5.2-5967-9 or above.<\/td>\n<\/tr>\n<tr>\n<td>SkyNAS<\/td>\n<td>Critical<\/td>\n<td>Ongoing<\/td>\n<\/tr>\n<tr>\n<td>VS960HD<\/td>\n<td>Not affected<\/td>\n<td>N\/A<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The upgrades will all be available, according to a message from a Synology spokesman to German site heise.de. If the auto-update is active on the devices, the devices or the software should be updated automatically.  <\/p>\n<blockquote>\n<p>I had already reported about the older Magellan vulnerability in December 2018 in the blog post <a href=\"https:\/\/borncity.com\/win\/2018\/12\/22\/magellan-security-advisory-synology-sa-1861\/\">Magellan: Security Advisory Synology-SA-18:61<\/a>. <\/p>\n<\/blockquote>\n<h2>Security warning Synology-SA-18:65 SRM <\/h2>\n<p>The company has still released the security warning <a href=\"https:\/\/www.synology.com\/en-global\/security\/advisory\/Synology_SA_18_65\" target=\"_blank\">Synology-SA-18:65 SRM<\/a> (thanks to @PhantomOfMobile for the hint). <\/p>\n<blockquote>\n<p>A vulnerability allows remote attackers to execute arbitrary code via a susceptible version of Synology Router Manager (SRM).<\/p>\n<\/blockquote>\n<p>A vulnerability allows remote attackers to execute arbitrary code through a vulnerable version of Synology Router Manager (SRM). The critical vulnerability affects SRM 1.2, and upgrading to 1.2-7742-5 or later should resolve the vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]There is a critical vulnerability in the Netatalk (Apple AFP) system software used by Synology NAS devices. Attackers could remotely execute malicious code on the device. A security update is available for affected devices. And Synology has issued two warnings &hellip; <a href=\"https:\/\/borncity.com\/win\/2019\/01\/04\/multiple-vulnerabilities-in-synology-nas-systems\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[448,580,1547],"tags":[950,69,1767],"class_list":["post-8184","post","type-post","status-publish","format-standard","hentry","category-devices","category-security","category-software","tag-nas","tag-security","tag-synology"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/8184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=8184"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/8184\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=8184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=8184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=8184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}