Synology DiskStation Manager up to 6.2 Random Generator random values
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.2 | $0-$5k | 0.00 |
A vulnerability classified as critical has been found in Synology DiskStation Manager up to 6.2 (Network Attached Storage Software). Affected is an unknown part of the component Random Generator. The manipulation with an unknown input leads to a random values vulnerability. CWE is classifying the issue as CWE-330. The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
Use of insufficiently random values vulnerability in SYNO.Encryption.GenRandomKey in Synology DiskStation Manager (DSM) before 6.2-23739 allows man-in-the-middle attackers to compromise non-HTTPS sessions via unspecified vectors.
The bug was discovered 07/30/2018. The weakness was presented 07/30/2018 (Website). The advisory is shared for download at synology.com. This vulnerability is traded as CVE-2018-13280 since 07/05/2018. The exploitability is told to be difficult. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1600.001.
Upgrading to version 6.2-23739 eliminates this vulnerability.
Product
Type
Vendor
Name
License
- commercial
CPE 2.3
CPE 2.2
CVSSv3
VulDB Meta Base Score: 6.3VulDB Meta Temp Score: 6.2
VulDB Base Score: 5.6
VulDB Temp Score: 5.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 5.9
NVD Vector: 🔍
CNA Base Score: 7.4
CNA Vector (Synology Inc.): 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Random valuesCWE: CWE-330 / CWE-310
ATT&CK: T1600.001
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: DiskStation Manager 6.2-23739
Timeline
07/05/2018 🔍07/30/2018 🔍
07/30/2018 🔍
07/30/2018 🔍
07/31/2018 🔍
04/27/2023 🔍
Sources
Vendor: synology.comAdvisory: SA_18_39
Status: Not defined
Confirmation: 🔍
CVE: CVE-2018-13280 (🔍)
Entry
Created: 07/31/2018 07:07 AMUpdated: 04/27/2023 06:36 PM
Changes: 07/31/2018 07:07 AM (59), 03/11/2020 10:14 AM (2), 04/27/2023 06:29 PM (4), 04/27/2023 06:36 PM (12)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.