• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new admin takeover vulnerability exposed in synology's diskstation manager

New Admin Takeover Vulnerability Exposed in Synology’s DiskStation Manager

You are here: Home / General Cyber Security News / New Admin Takeover Vulnerability Exposed in Synology’s DiskStation Manager
October 18, 2023

A medium-severity flaw has been discovered in Synology’s DiskStation Supervisor (DSM) that could be exploited to decipher an administrator’s password and remotely hijack the account.

“Less than some unusual situations, an attacker could leak enough info to restore the seed of the pseudorandom amount generator (PRNG), reconstruct the admin password, and remotely choose in excess of the admin account,” Claroty’s Sharon Brizinov explained in a Tuesday report.

The flaw, assigned the identifier CVE-2023-2729, is rated 5.9 for severity on the CVSS scoring scale. The flaw was addressed by Synology as section of updates launched in June 2023.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The problem is rooted in the fact that the application makes use of a weak random quantity generator that depends on the JavaScript Math.random() method to programmatically build the admin password for the network-attached storage (NAS) product.

Referred to as insecure randomness, it occurs when a functionality that can generate predictable values, or won’t have adequate entropy, is used as a supply of randomness in a security context, enabling an attacker to crack the encryption and defeat the integrity of sensitive facts and units.

Effective exploitation of such flaws, consequently, could enable the risk actor to forecast the produced password and gain accessibility to if not limited features.

“By leaking the output of a couple Math.Random() generated figures, we ended up equipped to reconstruct the seed for the PRNG and use it to brute-force the admin password,” Brizinov discussed. “Ultimately we ended up in a position to use the password to login to the admin account (right after enabling it).”

Cybersecurity

The attack, having said that, hinges on an attacker properly extracting a couple of GUIDs that are also produced using the same strategy for the duration of the setup course of action to be ready to reconstruct the seed phrase for the pseudorandom selection generator (PRNG).

“In a true daily life circumstance the attacker will initial want to leak the aforementioned GUIDs, brute pressure the Math.Random point out, and obtain the admin password,” Brizinov claimed. “Even following doing so, by default the builtin admin user account is disabled and most consumers will not enable it.”

“Yet again, it can be vital to recall that Math.random() does not provide cryptographically secure random numbers. Do not use them for everything linked to security. Use the Web Crypto API in its place, and much more specifically the window.crypto.getRandomValues() approach.”

Observed this post intriguing? Follow us on Twitter  and LinkedIn to go through a lot more exceptional material we put up.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «d link confirms data breach: employee falls victim to phishing attack D-Link Confirms Data Breach: Employee Falls Victim to Phishing Attack
Next Post: TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments tetrisphantom: cyber espionage via secure usbs targets apac governments»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.