Synology DiskStation Manager up to 6.1.3 SYNO.API.Encryption version cryptographic issues
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.2 | $0-$5k | 0.00 |
A vulnerability, which was classified as critical, was found in Synology DiskStation Manager up to 6.1.3 (Network Attached Storage Software). Affected is an unknown code block of the file SYNO.API.Encryption. The manipulation of the argument version
as part of a Parameter leads to a cryptographic issues vulnerability. CWE is classifying the issue as CWE-310. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
A design flaw in SYNO.API.Encryption in Synology DiskStation Manager (DSM) before 6.1.3-15152 allows remote attackers to bypass the encryption protection mechanism via the crafted version parameter.
The bug was discovered 07/14/2017. The weakness was released 07/24/2017 (Website). The advisory is available at synology.com. This vulnerability is traded as CVE-2017-9553 since 06/12/2017. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. Technical details are known, but there is no available exploit. This vulnerability is assigned to T1600 by the MITRE ATT&CK project.
The vulnerability was handled as a non-public zero-day exploit for at least 10 days. During that time the estimated underground price was around $0-$5k.
Upgrading to version 6.1.3-15152 eliminates this vulnerability.
Entry connected to this vulnerability is available at 104467.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.4VulDB Meta Temp Score: 7.2
VulDB Base Score: 7.3
VulDB Temp Score: 7.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.5
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cryptographic issuesCWE: CWE-310
ATT&CK: T1600
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: DiskStation Manager 6.1.3-15152
Timeline
06/12/2017 🔍07/14/2017 🔍
07/24/2017 🔍
07/24/2017 🔍
07/25/2017 🔍
12/13/2022 🔍
Sources
Vendor: synology.comAdvisory: SA_17_29
Status: Not defined
Confirmation: 🔍
CVE: CVE-2017-9553 (🔍)
See also: 🔍
Entry
Created: 07/25/2017 11:23Updated: 12/13/2022 18:50
Changes: 07/25/2017 11:23 (65), 11/01/2019 07:54 (2), 12/13/2022 18:50 (4)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.