• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new admin takeover vulnerability exposed in synology's diskstation manager

New Admin Takeover Vulnerability Exposed in Synology’s DiskStation Manager

You are here: Home / General Cyber Security News / New Admin Takeover Vulnerability Exposed in Synology’s DiskStation Manager
October 18, 2023

A medium-severity flaw has been discovered in Synology’s DiskStation Supervisor (DSM) that could be exploited to decipher an administrator’s password and remotely hijack the account.

“Less than some unusual situations, an attacker could leak enough info to restore the seed of the pseudorandom amount generator (PRNG), reconstruct the admin password, and remotely choose in excess of the admin account,” Claroty’s Sharon Brizinov explained in a Tuesday report.

The flaw, assigned the identifier CVE-2023-2729, is rated 5.9 for severity on the CVSS scoring scale. The flaw was addressed by Synology as section of updates launched in June 2023.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The problem is rooted in the fact that the application makes use of a weak random quantity generator that depends on the JavaScript Math.random() method to programmatically build the admin password for the network-attached storage (NAS) product.

Referred to as insecure randomness, it occurs when a functionality that can generate predictable values, or won’t have adequate entropy, is used as a supply of randomness in a security context, enabling an attacker to crack the encryption and defeat the integrity of sensitive facts and units.

Effective exploitation of such flaws, consequently, could enable the risk actor to forecast the produced password and gain accessibility to if not limited features.

“By leaking the output of a couple Math.Random() generated figures, we ended up equipped to reconstruct the seed for the PRNG and use it to brute-force the admin password,” Brizinov discussed. “Ultimately we ended up in a position to use the password to login to the admin account (right after enabling it).”

Cybersecurity

The attack, having said that, hinges on an attacker properly extracting a couple of GUIDs that are also produced using the same strategy for the duration of the setup course of action to be ready to reconstruct the seed phrase for the pseudorandom selection generator (PRNG).

“In a true daily life circumstance the attacker will initial want to leak the aforementioned GUIDs, brute pressure the Math.Random point out, and obtain the admin password,” Brizinov claimed. “Even following doing so, by default the builtin admin user account is disabled and most consumers will not enable it.”

“Yet again, it can be vital to recall that Math.random() does not provide cryptographically secure random numbers. Do not use them for everything linked to security. Use the Web Crypto API in its place, and much more specifically the window.crypto.getRandomValues() approach.”

Observed this post intriguing? Follow us on Twitter  and LinkedIn to go through a lot more exceptional material we put up.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «d link confirms data breach: employee falls victim to phishing attack D-Link Confirms Data Breach: Employee Falls Victim to Phishing Attack
Next Post: TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments tetrisphantom: cyber espionage via secure usbs targets apac governments»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.