• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
synology releases patch for critical rce vulnerability affecting vpn plus

Synology Releases Patch for Critical RCE Vulnerability Affecting VPN Plus Servers

You are here: Home / General Cyber Security News / Synology Releases Patch for Critical RCE Vulnerability Affecting VPN Plus Servers
January 4, 2023

Synology has unveiled security updates to deal with a critical flaw impacting VPN Furthermore Server that could be exploited to acquire about impacted devices.

Tracked as CVE-2022-43931, the vulnerability carries a optimum severity ranking of 10 on the CVSS scale and has been described as an out-of-bounds write bug in the remote desktop operation in Synology VPN Furthermore Server.

Thriving exploitation of the issue “lets remote attackers to execute arbitrary instructions by using unspecified vectors,” the Taiwanese company stated, adding it was internally uncovered by its Product Security Incident Response Crew (PSIRT).

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Consumers of VPN As well as Server for Synology Router Manager (SRM) 1.2 and VPN Moreover Server for SRM 1.3 are encouraged to update to versions 1.4.3-0534 and 1.4.4-0635, respectively.

The network-hooked up storage appliance maker, in a next advisory, also warned of numerous flaws in SRM that could permit distant attackers to execute arbitrary commands, conduct denial-of-service attacks, or read through arbitrary files.

Correct facts about the vulnerabilities have been withheld, with the users urged to upgrade to variations 1.2.5-8227-6 and 1.3.1-9346-3 to mitigate opportunity threats.

Gaurav Baruah, CrowdStrike’s Lukas Kupczyk, DEVCORE researcher Orange Tsai, and Netherlands-based mostly IT security company Computest have been credited for reporting the weaknesses.

It is worth noting that some of the vulnerabilities had been shown at the 2022 Pwn2Personal contest held between December 6 and 9, 2022, at Toronto.

Baruah gained $20,000 for a command injection attack against the WAN interface of the Synology RT6600ax, even though Computest netted $5,000 for a command injection root shell exploit aimed at its LAN interface.

Found this short article attention-grabbing? Follow us on Twitter  and LinkedIn to study extra special articles we submit.


Some parts of this post are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Researchers Discover New Linux Malware Targeting WordPress Sites
Next Post: New shc-based Linux Malware Targeting Systems with Cryptocurrency Miner new shc based linux malware targeting systems with cryptocurrency miner»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • WhatsApp Unveils Proxy Support to Tackle Internet Censorship
  • Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
  • Blind Eagle Hacking Group Targets South America With New Tools
  • US Family Planning Non-Profit MFHS Confirms Ransomware Attack
  • Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
  • Dridex Malware Now Attacking macOS Systems with Novel Infection Method
  • Cyber attacks on UK organisations surged 77% in 2022, new research finds
  • WhatsApp to combat internet blackouts with proxy server support
  • The IT Pro Podcast: Going passwordless
  • Podcast transcript: Going passwordless

Copyright © TheCyberSecurity.News, All Rights Reserved.